CVE-2025-2851: Buffer Overflow in GL.iNet GL-A1300 Slate Plus
A vulnerability classified as critical has been found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. Affected is an unknown function of the file plugins.so of the component RPC Handler. The manipulation leads to buffer overflow. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-2851 is a critical buffer overflow vulnerability affecting multiple GL.iNet router models running firmware version 4.x. The vulnerability resides in an unspecified function within the plugins.so file, specifically in the RPC Handler component. A buffer overflow occurs when manipulated input exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability requires low attack complexity and no user interaction, but does require low-level privileges (PR:L) and can be exploited remotely (AV:A). The impact on confidentiality, integrity, and availability is high, as indicated by the CVSS 4.0 vector. The affected devices include a broad range of GL.iNet products such as GL-A1300 Slate Plus, GL-AR series, GL-AX series, GL-B series, GL-E series, GL-M series, GL-SFT1200 Opal, and GL-X series routers. These devices are commonly used for home and small business networking, often deployed in environments requiring secure and reliable internet connectivity. No known exploits are currently reported in the wild, but the critical nature of the vulnerability and the widespread use of these devices make timely patching essential. The vendor recommends upgrading the affected component to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Exploitation could allow attackers to execute arbitrary code on affected routers, potentially gaining control over network traffic, intercepting sensitive data, or disrupting internet connectivity. This is particularly concerning for small and medium enterprises (SMEs) and remote offices relying on GL.iNet devices for VPN and secure communications. Compromise of these routers could lead to lateral movement within corporate networks, data breaches, or service outages. Given the high availability of GL.iNet products in Europe, especially in countries with strong SME sectors and remote work adoption, the threat could impact a wide range of sectors including finance, healthcare, and critical infrastructure. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent action.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations should verify the firmware version of all GL.iNet devices and upgrade to the latest patched version provided by the vendor as soon as it becomes available. 2. Network segmentation: Isolate affected devices on separate network segments to limit potential lateral movement in case of compromise. 3. Access control: Restrict administrative access to the devices to trusted IP addresses and enforce strong authentication mechanisms. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous RPC traffic or signs of exploitation attempts targeting the plugins.so component. 5. Disable unnecessary services: If possible, disable RPC services or plugins that are not required for device operation to reduce the attack surface. 6. Incident response readiness: Prepare to respond to potential exploitation by maintaining backups of device configurations and having a recovery plan to restore secure operation quickly. 7. Vendor communication: Maintain contact with GL.iNet for updates on patches and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-2851: Buffer Overflow in GL.iNet GL-A1300 Slate Plus
Description
A vulnerability classified as critical has been found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. Affected is an unknown function of the file plugins.so of the component RPC Handler. The manipulation leads to buffer overflow. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-2851 is a critical buffer overflow vulnerability affecting multiple GL.iNet router models running firmware version 4.x. The vulnerability resides in an unspecified function within the plugins.so file, specifically in the RPC Handler component. A buffer overflow occurs when manipulated input exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability requires low attack complexity and no user interaction, but does require low-level privileges (PR:L) and can be exploited remotely (AV:A). The impact on confidentiality, integrity, and availability is high, as indicated by the CVSS 4.0 vector. The affected devices include a broad range of GL.iNet products such as GL-A1300 Slate Plus, GL-AR series, GL-AX series, GL-B series, GL-E series, GL-M series, GL-SFT1200 Opal, and GL-X series routers. These devices are commonly used for home and small business networking, often deployed in environments requiring secure and reliable internet connectivity. No known exploits are currently reported in the wild, but the critical nature of the vulnerability and the widespread use of these devices make timely patching essential. The vendor recommends upgrading the affected component to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Exploitation could allow attackers to execute arbitrary code on affected routers, potentially gaining control over network traffic, intercepting sensitive data, or disrupting internet connectivity. This is particularly concerning for small and medium enterprises (SMEs) and remote offices relying on GL.iNet devices for VPN and secure communications. Compromise of these routers could lead to lateral movement within corporate networks, data breaches, or service outages. Given the high availability of GL.iNet products in Europe, especially in countries with strong SME sectors and remote work adoption, the threat could impact a wide range of sectors including finance, healthcare, and critical infrastructure. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent action.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations should verify the firmware version of all GL.iNet devices and upgrade to the latest patched version provided by the vendor as soon as it becomes available. 2. Network segmentation: Isolate affected devices on separate network segments to limit potential lateral movement in case of compromise. 3. Access control: Restrict administrative access to the devices to trusted IP addresses and enforce strong authentication mechanisms. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous RPC traffic or signs of exploitation attempts targeting the plugins.so component. 5. Disable unnecessary services: If possible, disable RPC services or plugins that are not required for device operation to reduce the attack surface. 6. Incident response readiness: Prepare to respond to potential exploitation by maintaining backups of device configurations and having a recovery plan to restore secure operation quickly. 7. Vendor communication: Maintain contact with GL.iNet for updates on patches and advisories related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-03-27T06:21:23.874Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef52e
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 9:04:24 PM
Last updated: 8/15/2025, 4:11:45 AM
Views: 19
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.