Skip to main content

CVE-2025-2850: Improper Authorization in GL.iNet GL-A1300 Slate Plus

Medium
VulnerabilityCVE-2025-2850cvecve-2025-2850
Published: Sat Apr 26 2025 (04/26/2025, 07:31:03 UTC)
Source: CVE
Vendor/Project: GL.iNet
Product: GL-A1300 Slate Plus

Description

A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been rated as problematic. This issue affects some unknown processing of the component Download Interface. The manipulation leads to improper authorization. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:04:42 UTC

Technical Analysis

CVE-2025-2850 is a medium-severity vulnerability affecting multiple GL.iNet router models running firmware version 4.x, including but not limited to GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR750 Creta, GL-AX1800 Flint, GL-B1300 Convexa-B, GL-MT300N-V2 Mango, and GL-X3000 Spitz AX. The vulnerability arises from improper authorization handling within the device's Download Interface component. Although the exact nature of the processing flaw is unspecified, improper authorization typically implies that the system fails to correctly verify user privileges before allowing access to certain functions or resources. This can potentially allow an attacker with limited privileges (low privileges, no user interaction required) to perform unauthorized actions related to the download interface, such as downloading or manipulating files or configurations that should be restricted. The CVSS 4.0 vector indicates the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and results in low confidentiality impact (VC:L) with no integrity or availability impact. This suggests the vulnerability could allow an attacker on the same local network segment to access or retrieve sensitive information or files that should be protected, but does not allow modification or disruption of device operation. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability affects a broad range of GL.iNet devices popular in small office/home office (SOHO) and mobile networking scenarios, indicating a potentially wide attack surface if exploited. Given the nature of the flaw, attackers could leverage this vulnerability to gain unauthorized access to configuration files or firmware components, potentially facilitating further attacks or information disclosure.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and remote workers relying on GL.iNet routers for secure internet access, this vulnerability poses a risk of unauthorized information disclosure. Attackers on the same local network or adjacent network segment could exploit the improper authorization to access sensitive device data, such as configuration files containing credentials or network settings. This could lead to further compromise of internal networks, interception of communications, or pivoting attacks. Although the vulnerability does not directly allow code execution or denial of service, the information gained could facilitate more severe attacks. Industries with distributed workforces, such as consulting, finance, or technology firms, may be particularly vulnerable if these devices are deployed without additional network segmentation or monitoring. The lack of user interaction and low complexity of exploitation increase the risk in environments where physical or network proximity is possible, such as shared office spaces or public Wi-Fi networks. Additionally, the broad range of affected models means many organizations may be unknowingly exposed if firmware updates are not applied promptly.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should monitor GL.iNet’s official channels for firmware updates addressing CVE-2025-2850 and apply them promptly across all affected devices. 2. Network segmentation: Isolate GL.iNet devices on separate VLANs or subnets to limit access to the Download Interface from untrusted or guest networks, reducing the risk of adjacent network exploitation. 3. Access control: Restrict management interface access to trusted IP addresses and disable remote management features if not required. 4. Monitoring and logging: Enable detailed logging on GL.iNet devices to detect unusual access patterns to the Download Interface and integrate logs with centralized SIEM solutions for real-time alerting. 5. Physical security: Ensure devices are physically secured to prevent unauthorized local network access. 6. Alternative devices: For high-security environments, consider using routers with a stronger security track record and timely patching policies until this vulnerability is resolved. 7. User awareness: Educate users about the risks of connecting to untrusted networks where attackers could exploit adjacent network vulnerabilities. These measures go beyond generic advice by focusing on network architecture changes and operational controls tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-03-27T06:21:21.419Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef526

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:04:42 PM

Last updated: 8/15/2025, 3:11:53 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats