Skip to main content

CVE-2022-31898: n/a in n/a

Medium
VulnerabilityCVE-2022-31898cvecve-2022-31898
Published: Thu Oct 27 2022 (10/27/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were discovered to contain multiple command injection vulnerabilities via the ping_addr and trace_addr function parameters.

AI-Powered Analysis

AILast updated: 07/05/2025, 10:41:43 UTC

Technical Analysis

CVE-2022-31898 is a vulnerability identified in specific versions of GL.iNet routers, namely the GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214. The issue involves multiple command injection vulnerabilities through the parameters ping_addr and trace_addr. Command injection vulnerabilities (CWE-78) allow an attacker to execute arbitrary commands on the underlying operating system via unsanitized input passed to system-level functions. In this case, the affected parameters are likely part of the router's web interface or API that handle network diagnostic functions such as ping and traceroute. An attacker with authenticated access (as indicated by the CVSS vector requiring high privileges) can exploit these parameters to inject malicious commands, potentially leading to full compromise of the device. The CVSS 3.1 score of 6.8 (medium severity) reflects the fact that exploitation requires authentication but has high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, suggesting that mitigation may require manual intervention or firmware updates from the vendor. The vulnerability affects network infrastructure devices that are often deployed in small office/home office (SOHO) environments or branch offices, which can serve as entry points into larger corporate networks if compromised.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those using GL.iNet routers in their network infrastructure. Exploitation could allow attackers to execute arbitrary commands on the router, leading to unauthorized access, data interception, network disruption, or pivoting to other internal systems. Given the routers' role in managing network traffic and security, a compromised device could undermine the confidentiality and integrity of corporate communications and data. The requirement for high privileges limits the attack surface to insiders or attackers who have obtained valid credentials, but this does not eliminate risk, as credential theft or phishing remain common. The impact is particularly critical for organizations with remote or distributed offices relying on these devices for VPN or secure connectivity. Additionally, disruption of availability could affect business continuity. The lack of known exploits in the wild reduces immediate urgency but does not preclude future exploitation, especially if attackers develop automated tools. Overall, the vulnerability could facilitate espionage, data breaches, or denial of service within European enterprises.

Mitigation Recommendations

European organizations should take the following specific steps: 1) Inventory all GL.iNet devices in use, focusing on the GL-MT300N-V2 Mango and GL-AX1800 Flint models. 2) Verify firmware versions and seek official updates or patches from GL.iNet; if none are available, contact vendor support for guidance. 3) Restrict administrative access to the router interfaces to trusted networks and users only, employing network segmentation and access control lists. 4) Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication where supported, to reduce risk of credential compromise. 5) Monitor router logs and network traffic for unusual activity indicative of command injection attempts or unauthorized access. 6) Disable or restrict use of diagnostic functions (ping, traceroute) accessible via web interfaces or APIs if not required. 7) Consider deploying network intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting these parameters. 8) Educate IT staff about the vulnerability and ensure rapid incident response capability in case of compromise. 9) For critical environments, consider replacing vulnerable devices with alternatives that have verified security postures. These measures go beyond generic advice by focusing on device-specific controls, access restrictions, and proactive monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-05-31T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9017

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 10:41:43 AM

Last updated: 7/26/2025, 6:37:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats