Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39228: n/a

0
Critical
VulnerabilityCVE-2024-39228cvecve-2024-39228
Published: Tue Aug 06 2024 (08/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:53:08 UTC

Technical Analysis

CVE-2024-39228 is a critical shell injection vulnerability identified in various GL-iNet router models and firmware versions, including AR750, AR750S, AR300M series, MT300N-V2, B1300, MT1300, SFT1200, X750, MT3000, MT2500, AXT1800, AX1800, A1300, X300B, XE300, E750, AP1300, S1300, XE3000, and X3000. The vulnerability resides in the interface functions check_ovpn_client_config and check_config, which improperly handle input, allowing an attacker to inject arbitrary shell commands. This is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 9.8, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability enables unauthenticated remote attackers to execute arbitrary commands on affected devices, potentially leading to full device compromise. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported as of the publication date (August 6, 2024). However, the critical nature and ease of exploitation make it a significant threat to users of these GL-iNet devices.

Potential Impact

The impact of CVE-2024-39228 is severe for organizations using affected GL-iNet routers. Successful exploitation allows remote attackers to execute arbitrary shell commands without authentication, leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, deployment of malware or ransomware, disruption of network availability, and potential lateral movement within corporate environments. The confidentiality of sensitive data passing through these routers is at high risk, as is the integrity of network configurations and the availability of network services. Given the widespread use of GL-iNet devices in small to medium enterprises, home offices, and IoT deployments, the vulnerability could be leveraged to create botnets or launch further attacks. The lack of required privileges or user interaction increases the likelihood of exploitation, making this a critical threat to global network security.

Mitigation Recommendations

To mitigate CVE-2024-39228, organizations should immediately identify and inventory all GL-iNet devices in their environment. Since no official patches are currently available, apply the following specific mitigations: 1) Restrict network access to the management interfaces of affected devices by implementing firewall rules that limit access to trusted IP addresses only. 2) Disable or restrict the use of vulnerable interface functions (check_ovpn_client_config and check_config) if possible through device configuration or custom firmware. 3) Monitor network traffic and device logs for unusual commands or access attempts targeting these interfaces. 4) Segment networks to isolate vulnerable devices from critical infrastructure and sensitive data. 5) Engage with GL-iNet support channels for updates on patches or firmware upgrades addressing this vulnerability. 6) Consider replacing affected devices with models confirmed to be secure if immediate patching is not feasible. 7) Educate network administrators about the risks and signs of exploitation to enable rapid detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c85b7ef31ef0b565d59

Added to database: 2/25/2026, 9:41:25 PM

Last enriched: 2/26/2026, 5:53:08 AM

Last updated: 4/12/2026, 3:46:08 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses