Skip to main content

CVE-2025-2811: Inefficient Regular Expression Complexity in GL.iNet GL-A1300 Slate Plus

Medium
VulnerabilityCVE-2025-2811cvecve-2025-2811
Published: Sat Apr 26 2025 (04/26/2025, 07:00:05 UTC)
Source: CVE
Vendor/Project: GL.iNet
Product: GL-A1300 Slate Plus

Description

A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to inefficient regular expression complexity. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:06:51 UTC

Technical Analysis

CVE-2025-2811 is a vulnerability identified in multiple GL.iNet router models running firmware version 4.x. The affected devices include a broad range of GL.iNet products such as GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR750 Creta, GL-AX1800 Flint, GL-B1300 Convexa-B, GL-MT1300 Beryl, GL-X3000 Spitz AX, among others. The vulnerability arises from inefficient regular expression complexity within an unspecified API component of the firmware. This inefficiency can be exploited by an attacker to cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability does not require user interaction, but it does require low-level privileges (PR:L) and network access (AV:A), indicating that an attacker must have some authenticated access to the device or network segment to exploit it. The CVSS 4.0 base score is 6.9 (medium severity), reflecting a moderate impact primarily on availability (VA:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or mitigation links have been published yet. The root cause is related to inefficient handling of regular expressions, which can cause the device to consume excessive CPU or memory resources when processing crafted inputs, leading to service degradation or outage. Given the wide range of affected models, the vulnerability poses a risk to organizations relying on these GL.iNet devices for network connectivity or edge routing functions.

Potential Impact

For European organizations using GL.iNet routers, this vulnerability could result in network disruptions due to denial of service caused by resource exhaustion. This can impact business continuity, especially for small and medium enterprises or remote offices that depend on these devices for internet access or VPN connectivity. While confidentiality and integrity are not directly impacted, availability degradation can interrupt critical communications and services. The requirement for low-level privileges and network access limits the attack surface to insiders or attackers who have already gained some foothold in the network, but it still represents a significant risk in environments with less stringent access controls. The broad product range affected means that organizations with diverse GL.iNet deployments could face widespread exposure. Additionally, the lack of patches or mitigations at present increases the window of vulnerability. Disruptions could affect sectors reliant on stable network infrastructure, including finance, healthcare, and manufacturing. The vulnerability could also be leveraged as part of a multi-stage attack to degrade defenses or distract security teams.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the management interfaces and APIs of affected GL.iNet devices to trusted administrators only, using network segmentation and access control lists (ACLs). 2. Monitor device performance and logs for signs of resource exhaustion or unusual API request patterns that could indicate exploitation attempts. 3. Disable or limit features that expose the vulnerable API component if possible, pending vendor patches. 4. Implement strict authentication and authorization controls to prevent unauthorized access, including strong password policies and multi-factor authentication where supported. 5. Regularly check for firmware updates from GL.iNet and apply patches as soon as they become available. 6. Consider deploying network-based intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting these devices. 7. For critical environments, evaluate the feasibility of replacing affected devices with alternatives not impacted by this vulnerability until a patch is released. 8. Educate network administrators about this vulnerability and encourage vigilance for related indicators of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-03-26T12:11:36.452Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef4bf

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:06:51 PM

Last updated: 7/30/2025, 9:12:11 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats