Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39228: n/a

0
Critical
VulnerabilityCVE-2024-39228cvecve-2024-39228
Published: Tue Aug 06 2024 (08/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39228 is a critical shell injection vulnerability affecting multiple GL-iNet router models and firmware versions. The flaw exists in the interface functions check_ovpn_client_config and check_config, allowing unauthenticated remote attackers to execute arbitrary shell commands. With a CVSS score of 9. 8, this vulnerability poses a severe risk to confidentiality, integrity, and availability without requiring user interaction or privileges. Exploitation could lead to full system compromise, data theft, or network disruption. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact demand immediate attention. Organizations using affected GL-iNet devices should prioritize patching or apply mitigations to prevent exploitation. Countries with widespread GL-iNet deployments and strategic reliance on these devices are at higher risk. Defenders must monitor for suspicious activity targeting these interfaces and restrict network exposure of vulnerable devices.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:53:08 UTC

Technical Analysis

CVE-2024-39228 is a critical shell injection vulnerability identified in various GL-iNet router models and firmware versions, including AR750, AR750S, AR300M series, MT300N-V2, B1300, MT1300, SFT1200, X750, MT3000, MT2500, AXT1800, AX1800, A1300, X300B, XE300, E750, AP1300, S1300, XE3000, and X3000. The vulnerability resides in the interface functions check_ovpn_client_config and check_config, which improperly handle input, allowing an attacker to inject arbitrary shell commands. This is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 9.8, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability enables unauthenticated remote attackers to execute arbitrary commands on affected devices, potentially leading to full device compromise. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported as of the publication date (August 6, 2024). However, the critical nature and ease of exploitation make it a significant threat to users of these GL-iNet devices.

Potential Impact

The impact of CVE-2024-39228 is severe for organizations using affected GL-iNet routers. Successful exploitation allows remote attackers to execute arbitrary shell commands without authentication, leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, deployment of malware or ransomware, disruption of network availability, and potential lateral movement within corporate environments. The confidentiality of sensitive data passing through these routers is at high risk, as is the integrity of network configurations and the availability of network services. Given the widespread use of GL-iNet devices in small to medium enterprises, home offices, and IoT deployments, the vulnerability could be leveraged to create botnets or launch further attacks. The lack of required privileges or user interaction increases the likelihood of exploitation, making this a critical threat to global network security.

Mitigation Recommendations

To mitigate CVE-2024-39228, organizations should immediately identify and inventory all GL-iNet devices in their environment. Since no official patches are currently available, apply the following specific mitigations: 1) Restrict network access to the management interfaces of affected devices by implementing firewall rules that limit access to trusted IP addresses only. 2) Disable or restrict the use of vulnerable interface functions (check_ovpn_client_config and check_config) if possible through device configuration or custom firmware. 3) Monitor network traffic and device logs for unusual commands or access attempts targeting these interfaces. 4) Segment networks to isolate vulnerable devices from critical infrastructure and sensitive data. 5) Engage with GL-iNet support channels for updates on patches or firmware upgrades addressing this vulnerability. 6) Consider replacing affected devices with models confirmed to be secure if immediate patching is not feasible. 7) Educate network administrators about the risks and signs of exploitation to enable rapid detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c85b7ef31ef0b565d59

Added to database: 2/25/2026, 9:41:25 PM

Last enriched: 2/26/2026, 5:53:08 AM

Last updated: 2/26/2026, 7:59:43 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats