CVE-2023-50919: n/a in n/a
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
AI Analysis
Technical Summary
CVE-2023-50919 is a critical authentication bypass vulnerability affecting multiple GL.iNet router devices running firmware versions prior to 4.5.0. The root cause lies in the way NGINX, used as the web server component on these devices, handles authentication via Lua string pattern matching. Specifically, the vulnerability arises because the Lua pattern matching logic used to enforce authentication can be bypassed, allowing an attacker to circumvent the authentication mechanism entirely. This means that an unauthenticated remote attacker can gain unauthorized access to the device's management interface or other protected resources without providing valid credentials. The affected devices include a range of GL.iNet models such as A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, and B1300, all running various firmware versions before 4.5.0. The vulnerability is classified under CWE-287 (Improper Authentication) and has a CVSS v3.1 base score of 9.8, indicating a critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this a significant threat. Attackers exploiting this flaw could fully compromise affected devices, potentially gaining control over network traffic, deploying malicious configurations, or using the device as a foothold for further network intrusion.
Potential Impact
For European organizations, the impact of CVE-2023-50919 could be severe. GL.iNet devices are popular for small office/home office (SOHO) and remote work environments due to their affordability and feature set. An attacker exploiting this vulnerability could gain administrative control over these routers, leading to interception or manipulation of network traffic, exposure of sensitive data, and disruption of network availability. This is particularly critical for organizations relying on these devices for VPN termination, secure remote access, or network segmentation. The compromise of such devices could facilitate lateral movement within corporate networks or enable persistent access for espionage or sabotage. Given the criticality and the lack of authentication barriers, attackers could automate exploitation at scale, targeting vulnerable devices across Europe. This could impact sectors with high reliance on secure network infrastructure, including finance, healthcare, government, and critical infrastructure providers.
Mitigation Recommendations
To mitigate CVE-2023-50919, European organizations using GL.iNet devices should immediately upgrade affected devices to firmware version 4.5.0 or later, where the authentication bypass has been addressed. If immediate upgrade is not feasible, organizations should restrict management interface access to trusted internal networks only, using firewall rules or VLAN segmentation to prevent exposure to untrusted networks or the internet. Additionally, monitoring network traffic for unusual access patterns or unauthorized configuration changes can help detect exploitation attempts. Organizations should also consider disabling remote management features if not required. For environments with high security requirements, replacing vulnerable devices with alternatives from vendors with robust security track records may be warranted. Finally, maintaining an inventory of all GL.iNet devices and their firmware versions is critical for ensuring timely patch management and vulnerability remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2023-50919: n/a in n/a
Description
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
AI-Powered Analysis
Technical Analysis
CVE-2023-50919 is a critical authentication bypass vulnerability affecting multiple GL.iNet router devices running firmware versions prior to 4.5.0. The root cause lies in the way NGINX, used as the web server component on these devices, handles authentication via Lua string pattern matching. Specifically, the vulnerability arises because the Lua pattern matching logic used to enforce authentication can be bypassed, allowing an attacker to circumvent the authentication mechanism entirely. This means that an unauthenticated remote attacker can gain unauthorized access to the device's management interface or other protected resources without providing valid credentials. The affected devices include a range of GL.iNet models such as A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, and B1300, all running various firmware versions before 4.5.0. The vulnerability is classified under CWE-287 (Improper Authentication) and has a CVSS v3.1 base score of 9.8, indicating a critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this a significant threat. Attackers exploiting this flaw could fully compromise affected devices, potentially gaining control over network traffic, deploying malicious configurations, or using the device as a foothold for further network intrusion.
Potential Impact
For European organizations, the impact of CVE-2023-50919 could be severe. GL.iNet devices are popular for small office/home office (SOHO) and remote work environments due to their affordability and feature set. An attacker exploiting this vulnerability could gain administrative control over these routers, leading to interception or manipulation of network traffic, exposure of sensitive data, and disruption of network availability. This is particularly critical for organizations relying on these devices for VPN termination, secure remote access, or network segmentation. The compromise of such devices could facilitate lateral movement within corporate networks or enable persistent access for espionage or sabotage. Given the criticality and the lack of authentication barriers, attackers could automate exploitation at scale, targeting vulnerable devices across Europe. This could impact sectors with high reliance on secure network infrastructure, including finance, healthcare, government, and critical infrastructure providers.
Mitigation Recommendations
To mitigate CVE-2023-50919, European organizations using GL.iNet devices should immediately upgrade affected devices to firmware version 4.5.0 or later, where the authentication bypass has been addressed. If immediate upgrade is not feasible, organizations should restrict management interface access to trusted internal networks only, using firewall rules or VLAN segmentation to prevent exposure to untrusted networks or the internet. Additionally, monitoring network traffic for unusual access patterns or unauthorized configuration changes can help detect exploitation attempts. Organizations should also consider disabling remote management features if not required. For environments with high security requirements, replacing vulnerable devices with alternatives from vendors with robust security track records may be warranted. Finally, maintaining an inventory of all GL.iNet devices and their firmware versions is critical for ensuring timely patch management and vulnerability remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e6611
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 2:13:17 PM
Last updated: 8/8/2025, 4:12:23 PM
Views: 11
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.