CVE-2025-67090: n/a
The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-67090 affects the LuCI web interface on Gl Inet AX1800 routers, specifically versions 4.6.4 and 4.6.8. The core issue is the absence of rate limiting or account lockout mechanisms on the authentication endpoint located at /cgi-bin/luci. This design flaw allows an unauthenticated attacker who has access to the local network to perform unlimited password attempts against the administrative interface without restriction. The lack of throttling or lockout means brute force attacks can be conducted efficiently, increasing the likelihood of compromising the admin credentials. Once an attacker gains administrative access, they can manipulate router configurations, intercept or redirect network traffic, and potentially pivot to other internal systems. The vulnerability does not require prior authentication, but does require local network access, which could be achieved through compromised devices or physical proximity. No CVSS score has been assigned yet, and no known exploits are reported in the wild. A patch addressing this vulnerability is available in Gl Inet AX1800 firmware version 4.8.2. The vulnerability highlights the importance of implementing robust authentication protections such as rate limiting and account lockouts on critical network device interfaces.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to Gl Inet AX1800 routers, compromising network security and confidentiality. Attackers exploiting this flaw can alter router settings, disrupt network availability, intercept sensitive communications, or establish persistent footholds within internal networks. This is particularly concerning for organizations with sensitive data or critical infrastructure relying on these routers. The local network access requirement limits remote exploitation but does not eliminate risk, as attackers could gain local access via compromised devices or insider threats. The absence of rate limiting increases the risk of successful brute force attacks, potentially leading to widespread compromise if many devices remain unpatched. The impact extends to operational disruption, data breaches, and potential lateral movement within corporate or industrial networks. Given the router’s role as a network gateway, exploitation could affect multiple connected systems, amplifying the severity of the breach.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should promptly upgrade Gl Inet AX1800 routers to firmware version 4.8.2 or later, which includes the necessary fixes. Network administrators should implement network segmentation to restrict access to router management interfaces strictly to trusted devices and personnel. Deploying network monitoring solutions to detect unusual authentication attempts or brute force patterns on the /cgi-bin/luci endpoint can provide early warning of exploitation attempts. Additionally, organizations should enforce strong, complex admin passwords and consider disabling remote management features if not required. Physical security controls should be enhanced to prevent unauthorized local network access. Where possible, use VPNs or secure management channels to access router interfaces rather than exposing them directly on local networks. Regularly auditing router configurations and logs will help identify suspicious activity. Finally, educating staff about the risks of local network compromise can reduce insider threats and accidental exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-67090: n/a
Description
The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-67090 affects the LuCI web interface on Gl Inet AX1800 routers, specifically versions 4.6.4 and 4.6.8. The core issue is the absence of rate limiting or account lockout mechanisms on the authentication endpoint located at /cgi-bin/luci. This design flaw allows an unauthenticated attacker who has access to the local network to perform unlimited password attempts against the administrative interface without restriction. The lack of throttling or lockout means brute force attacks can be conducted efficiently, increasing the likelihood of compromising the admin credentials. Once an attacker gains administrative access, they can manipulate router configurations, intercept or redirect network traffic, and potentially pivot to other internal systems. The vulnerability does not require prior authentication, but does require local network access, which could be achieved through compromised devices or physical proximity. No CVSS score has been assigned yet, and no known exploits are reported in the wild. A patch addressing this vulnerability is available in Gl Inet AX1800 firmware version 4.8.2. The vulnerability highlights the importance of implementing robust authentication protections such as rate limiting and account lockouts on critical network device interfaces.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to Gl Inet AX1800 routers, compromising network security and confidentiality. Attackers exploiting this flaw can alter router settings, disrupt network availability, intercept sensitive communications, or establish persistent footholds within internal networks. This is particularly concerning for organizations with sensitive data or critical infrastructure relying on these routers. The local network access requirement limits remote exploitation but does not eliminate risk, as attackers could gain local access via compromised devices or insider threats. The absence of rate limiting increases the risk of successful brute force attacks, potentially leading to widespread compromise if many devices remain unpatched. The impact extends to operational disruption, data breaches, and potential lateral movement within corporate or industrial networks. Given the router’s role as a network gateway, exploitation could affect multiple connected systems, amplifying the severity of the breach.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should promptly upgrade Gl Inet AX1800 routers to firmware version 4.8.2 or later, which includes the necessary fixes. Network administrators should implement network segmentation to restrict access to router management interfaces strictly to trusted devices and personnel. Deploying network monitoring solutions to detect unusual authentication attempts or brute force patterns on the /cgi-bin/luci endpoint can provide early warning of exploitation attempts. Additionally, organizations should enforce strong, complex admin passwords and consider disabling remote management features if not required. Physical security controls should be enhanced to prevent unauthorized local network access. Where possible, use VPNs or secure management channels to access router interfaces rather than exposing them directly on local networks. Regularly auditing router configurations and logs will help identify suspicious activity. Finally, educating staff about the risks of local network compromise can reduce insider threats and accidental exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695fd2d12717593a3341ed5f
Added to database: 1/8/2026, 3:52:49 PM
Last enriched: 1/8/2026, 4:01:35 PM
Last updated: 1/9/2026, 12:13:46 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
377,000 Impacted by Data Breach at Texas Gas Station Firm
MediumCVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137
MediumCVE-2025-66050: CWE-1393 Use of Default Password in Vivotek IP7137
CriticalCVE-2025-66049: CWE-306 Missing Authentication for Critical Function in Vivotek IP7137
HighCVE-2026-22081: CWE-1004 - Sensitive Cookie Without HttpOnly Flag in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.