Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67089: n/a

0
High
VulnerabilityCVE-2025-67089cvecve-2025-67089
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67089 is a high-severity command injection vulnerability in the GL-iNet GL-AXT1800 router firmware version 4. 6. 8. It affects the `plugins. install_package` RPC method, which improperly sanitizes user input in package names. Authenticated attackers can exploit this flaw to execute arbitrary commands with root privileges, potentially compromising the entire device. The vulnerability requires authentication but no user interaction and can be exploited remotely over the network. There are currently no known public exploits or patches available. European organizations using this router model are at risk of device takeover, leading to confidentiality and integrity breaches. Mitigation involves restricting access to the router management interface, monitoring for suspicious activity, and applying vendor updates once released.

AI-Powered Analysis

AILast updated: 01/15/2026, 17:16:39 UTC

Technical Analysis

CVE-2025-67089 is a command injection vulnerability identified in the GL-iNet GL-AXT1800 router firmware version 4.6.8. The flaw exists in the `plugins.install_package` RPC method, which is responsible for installing software packages on the device. This method fails to properly sanitize user-supplied input in the package name parameter, allowing an authenticated attacker to inject arbitrary shell commands. Because the router executes these commands with root privileges, successful exploitation grants full control over the device. The vulnerability is remotely exploitable over the network, requiring the attacker to authenticate to the router's management interface but not requiring any additional user interaction. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, with no impact on availability. Although no public exploits have been reported yet, the severity and ease of exploitation make this a critical concern for affected users. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), a common and dangerous injection flaw. No patches or vendor advisories are currently available, increasing the urgency for defensive measures. Attackers exploiting this vulnerability could manipulate router configurations, intercept or redirect network traffic, or use the device as a foothold for further network compromise.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected routers, which are often used as network gateways or in branch office environments. This can result in unauthorized access to internal networks, interception of sensitive communications, and disruption of network operations. The root-level access gained by attackers could allow installation of persistent malware, creation of backdoors, or participation in botnets. Confidentiality and integrity of data traversing the compromised routers would be severely impacted. Given the critical role of routers in network security, this vulnerability could facilitate lateral movement within corporate networks or critical infrastructure systems. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly at risk due to the sensitivity of their data and the strategic importance of their networks. The lack of available patches increases the window of exposure, emphasizing the need for immediate mitigation steps.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface to trusted networks and users only, using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and change default credentials to prevent unauthorized login. 3. Monitor router logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected RPC calls or command executions. 4. Disable or restrict the use of the `plugins.install_package` RPC method if possible, or limit its accessibility to highly trusted administrators. 5. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect command injection patterns or anomalous behavior. 6. Regularly check for firmware updates from GL-iNet and apply patches promptly once available. 7. Consider deploying additional endpoint security controls on devices behind the router to detect lateral movement or unusual network behavior. 8. Educate network administrators about this vulnerability and the importance of monitoring and access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fd2d12717593a3341ed5b

Added to database: 1/8/2026, 3:52:49 PM

Last enriched: 1/15/2026, 5:16:39 PM

Last updated: 2/7/2026, 8:18:05 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats