Skip to main content

CVE-2023-50922: n/a in n/a

High
VulnerabilityCVE-2023-50922cvecve-2023-50922
Published: Wed Jan 03 2024 (01/03/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered on GL.iNet devices through 4.5.0. Attackers who are able to steal the AdminToken cookie can execute arbitrary code by uploading a crontab-formatted file to a specific directory and waiting for its execution. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:27:45 UTC

Technical Analysis

CVE-2023-50922 is a high-severity vulnerability affecting multiple GL.iNet router devices running firmware versions up to 4.5.0. The vulnerability arises from improper handling of uploaded files by the device's administrative interface. Specifically, if an attacker can obtain the AdminToken cookie—used for authenticating administrative sessions—they can upload a specially crafted file formatted as a crontab entry to a designated directory on the device. Because the system processes crontab files to schedule tasks, this malicious file will be executed by the system's cron daemon, allowing the attacker to execute arbitrary code with elevated privileges. This vulnerability affects a broad range of GL.iNet models, including A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, and B1300, across various firmware versions primarily in the 4.x series. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that the device fails to properly restrict or sanitize uploaded files. The CVSS v3.1 base score is 7.2, reflecting a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring high privileges (possession of AdminToken cookie). No user interaction is needed once the token is obtained. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution on network infrastructure devices. The lack of available patches at the time of reporting further increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability presents a critical risk to network security and operational continuity. GL.iNet devices are commonly used as routers and access points in small to medium enterprises and possibly in branch offices due to their cost-effectiveness and feature set. Successful exploitation could lead to full compromise of the affected device, allowing attackers to execute arbitrary commands, potentially pivot within the network, intercept or manipulate network traffic, and disrupt services. The compromise of router devices can undermine the confidentiality of sensitive communications, integrity of network configurations, and availability of network connectivity. This is particularly concerning for organizations handling sensitive data under GDPR regulations, as unauthorized access or data interception could lead to compliance violations and financial penalties. Furthermore, the ability to schedule arbitrary tasks via cron could allow persistent backdoors or lateral movement within corporate networks. The requirement to obtain the AdminToken cookie implies that attackers must first breach or phish administrative credentials or session tokens, which may be feasible through social engineering or other vulnerabilities. Given the widespread use of GL.iNet devices in Europe, especially in small offices and remote work environments, the threat could impact a broad range of sectors including finance, healthcare, and government agencies.

Mitigation Recommendations

1. Immediate mitigation should focus on securing administrative access to GL.iNet devices. This includes enforcing strong, unique passwords for administrative accounts and implementing multi-factor authentication if supported. 2. Network segmentation should be employed to isolate management interfaces from general user networks and the internet, reducing the risk of token theft. 3. Monitor network traffic and device logs for unusual file uploads or crontab modifications, which may indicate exploitation attempts. 4. Restrict access to the device's administrative interface to trusted IP addresses or VPN connections. 5. Regularly update device firmware as soon as GL.iNet releases patches addressing this vulnerability; maintain close communication with the vendor for updates. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous processes or scheduled tasks on network devices. 7. Educate administrators about phishing and session hijacking risks to prevent AdminToken theft. 8. If patching is not immediately possible, consider temporary replacement of affected devices with models not vulnerable or alternative vendors. 9. Conduct penetration testing and vulnerability assessments focusing on router devices to identify potential compromise. These steps go beyond generic advice by emphasizing administrative access protection, network architecture adjustments, and proactive monitoring specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff323

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 5:27:45 AM

Last updated: 8/13/2025, 7:52:52 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats