CVE-2024-39226: n/a
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
AI Analysis
Technical Summary
CVE-2024-39226 is a command injection vulnerability identified in various GL-iNet router models, including AR750, AR750S, AR300M series, MT300N-V2, B1300, MT1300, SFT1200, X750, MT3000, MT2500, AXT1800, AX1800, A1300, X300B, XE300, E750, AP1300, S1300, XE3000, and X3000, across firmware versions 4.3.11 through 4.5.16 and others as specified. The vulnerability arises from insufficient input sanitization in the s2s API, which handles server-to-server communication. Attackers can exploit this flaw by sending crafted requests containing malicious shell commands, leading to command injection (CWE-77). This allows execution of arbitrary commands on the router without requiring authentication or user interaction. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L), with no direct confidentiality or integrity compromise. No patches or known exploits are currently reported, but the vulnerability poses a risk of denial of service or disruption of network operations if exploited.
Potential Impact
The primary impact of CVE-2024-39226 is on the availability of affected GL-iNet routers. Successful exploitation can lead to denial of service conditions, potentially causing network outages or degraded performance. While confidentiality and integrity are not directly compromised, disruption of router functionality can affect business continuity, especially in environments relying on these devices for critical connectivity. Organizations using these routers in enterprise, industrial, or remote access scenarios may face operational interruptions. The lack of authentication requirement and low attack complexity increase the risk of exploitation from adjacent networks, such as local LANs or VPNs. Although no known exploits exist yet, the vulnerability could be leveraged by attackers to disrupt services or as a stepping stone for further attacks if combined with other vulnerabilities.
Mitigation Recommendations
1. Restrict access to the s2s API by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 2. Monitor network traffic for unusual or malformed requests targeting the s2s API endpoints. 3. Disable the s2s API if it is not required for your deployment to reduce the attack surface. 4. Apply firmware updates from GL-iNet promptly once patches addressing this vulnerability are released. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 6. Conduct regular security assessments and penetration testing focusing on router management interfaces. 7. Maintain an inventory of affected devices and track their firmware versions to prioritize remediation. 8. Educate network administrators about this vulnerability and the importance of securing router management interfaces.
Affected Countries
United States, China, Germany, Japan, Australia, United Kingdom, France, South Korea, Canada, Netherlands
CVE-2024-39226: n/a
Description
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-39226 is a command injection vulnerability identified in various GL-iNet router models, including AR750, AR750S, AR300M series, MT300N-V2, B1300, MT1300, SFT1200, X750, MT3000, MT2500, AXT1800, AX1800, A1300, X300B, XE300, E750, AP1300, S1300, XE3000, and X3000, across firmware versions 4.3.11 through 4.5.16 and others as specified. The vulnerability arises from insufficient input sanitization in the s2s API, which handles server-to-server communication. Attackers can exploit this flaw by sending crafted requests containing malicious shell commands, leading to command injection (CWE-77). This allows execution of arbitrary commands on the router without requiring authentication or user interaction. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L), with no direct confidentiality or integrity compromise. No patches or known exploits are currently reported, but the vulnerability poses a risk of denial of service or disruption of network operations if exploited.
Potential Impact
The primary impact of CVE-2024-39226 is on the availability of affected GL-iNet routers. Successful exploitation can lead to denial of service conditions, potentially causing network outages or degraded performance. While confidentiality and integrity are not directly compromised, disruption of router functionality can affect business continuity, especially in environments relying on these devices for critical connectivity. Organizations using these routers in enterprise, industrial, or remote access scenarios may face operational interruptions. The lack of authentication requirement and low attack complexity increase the risk of exploitation from adjacent networks, such as local LANs or VPNs. Although no known exploits exist yet, the vulnerability could be leveraged by attackers to disrupt services or as a stepping stone for further attacks if combined with other vulnerabilities.
Mitigation Recommendations
1. Restrict access to the s2s API by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 2. Monitor network traffic for unusual or malformed requests targeting the s2s API endpoints. 3. Disable the s2s API if it is not required for your deployment to reduce the attack surface. 4. Apply firmware updates from GL-iNet promptly once patches addressing this vulnerability are released. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 6. Conduct regular security assessments and penetration testing focusing on router management interfaces. 7. Maintain an inventory of affected devices and track their firmware versions to prioritize remediation. 8. Educate network administrators about this vulnerability and the importance of securing router management interfaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c85b7ef31ef0b565d53
Added to database: 2/25/2026, 9:41:25 PM
Last enriched: 2/26/2026, 5:52:40 AM
Last updated: 4/12/2026, 3:34:58 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.