Description
A security flaw has been discovered in GL.iNet GL-RM1, GL-RM10, GL-RM10RC and GL-RM1PE 1.8.1. Affected by this issue is some unknown functionality of the component Factory Reset Handler. Performing a manipulation results in improper authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.8.2 can resolve this issue. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper authentication flaw in the Factory Reset Handler of the affected GL.iNet devices. When the device is reset, manipulated input allows an attacker to bypass the authentication requirement, enabling unauthorized control of the device. This weakness is classified as CWE‑287, indicating a failure to properly verify the user's identity. The flaw can be triggered remotely, potentially giving a malicious actor admin‑level access to change settings, access network traffic, or install malware. The exploitation is described as difficult and high in complexity, but the consequence is significant if an attacker succeeds.

Affected Systems

The flaw affects GL.iNet models GL‑RM1, GL‑RM10, GL‑RM10RC, and GL‑RM1PE running firmware version 1.8.1. An upgrade to firmware 1.8.2 resolves the issue. No further version details are listed, so owners of any devices running the mentioned model series with firmware 1.8.1 should be treated as vulnerable.

Risk and Exploitability

The CVSS score of 7.5 places the vulnerability in the high severity range. EPSS information is not available, and the flaw is not listed in the CISA KEV catalog. Attackers would need remote access to the device and must perform complex manipulation of the reset process to bypass authentication, making exploitation nontrivial. Nonetheless, given the remote initiation and significant impact on device control, the overall risk remains high for exposed or poorly isolated networks.

Generated by OpenCVE AI on April 9, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply firmware update to version 1.8.2 from GL.iNet

Generated by OpenCVE AI on April 9, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Gl.inet
Gl.inet gl-rm1
Gl.inet gl-rm10
Gl.inet gl-rm10rc
Gl.inet gl-rm1pe
Vendors & Products Gl.inet
Gl.inet gl-rm1
Gl.inet gl-rm10
Gl.inet gl-rm10rc
Gl.inet gl-rm1pe

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in GL.iNet GL-RM1, GL-RM10, GL-RM10RC and GL-RM1PE 1.8.1. Affected by this issue is some unknown functionality of the component Factory Reset Handler. Performing a manipulation results in improper authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.8.2 can resolve this issue. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title GL.iNet GL-RM1/GL-RM10/GL-RM10RC/GL-RM1PE Factory Reset improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 6.8, 'vector': 'AV:N/AC:H/Au:M/C:C/I:C/A:C/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 6.6, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Gl.inet Gl-rm1 Gl-rm10 Gl-rm10rc Gl-rm1pe
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T14:30:14.351Z

Reserved: 2026-04-09T09:50:43.991Z

Link: CVE-2026-5959

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T15:16:17.760

Modified: 2026-04-09T15:16:17.760

Link: CVE-2026-5959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:45Z

Weaknesses