Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67090: n/a

0
Medium
VulnerabilityCVE-2025-67090cvecve-2025-67090
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67090 affects the LuCI web interface on GL. Inet AX1800 routers running versions 4. 6. 4 and 4. 6. 8. The vulnerability arises because the authentication endpoint (/cgi-bin/luci) lacks rate limiting or account lockout mechanisms, allowing unauthenticated attackers on the local network to perform unlimited password guessing attempts. This flaw can lead to partial confidentiality loss and limited availability impact if the attacker succeeds in brute forcing the admin password. The vulnerability has a CVSS score of 5. 1, indicating medium severity.

AI-Powered Analysis

AILast updated: 01/15/2026, 17:17:21 UTC

Technical Analysis

CVE-2025-67090 is a medium severity vulnerability affecting the LuCI web interface on GL.Inet AX1800 routers, specifically versions 4.6.4 and 4.6.8. The core issue is the absence of rate limiting or account lockout mechanisms on the authentication endpoint (/cgi-bin/luci). This design flaw allows an unauthenticated attacker with local network access to perform unlimited password guessing attempts against the admin interface, effectively enabling brute force attacks. The vulnerability is categorized under CWE-307 (Improper Restriction of Excessive Authentication Attempts). Exploiting this vulnerability requires local network access but no prior authentication or user interaction. Successful exploitation could lead to unauthorized access to the router’s administrative interface, potentially compromising confidentiality of network configuration and causing limited availability disruption. The CVSS vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) reflects that the attack is local, requires low complexity, no privileges or user interaction, and impacts confidentiality and availability partially. Although no known exploits are reported in the wild, the vulnerability poses a risk especially in environments where the GL.Inet AX1800 routers are deployed in sensitive or critical network segments. The vendor has released a patch in version 4.8.2 to address this issue by presumably adding rate limiting or lockout controls.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized administrative access to GL.Inet AX1800 routers if attackers gain local network access, such as through compromised internal devices or guest networks. This could result in exposure of network configuration details, potential interception or redirection of traffic, and limited denial of service if the attacker disrupts router functionality. Sectors with high reliance on secure network infrastructure, including government, finance, healthcare, and critical infrastructure, may face increased risks. The medium CVSS score reflects moderate impact, but the ease of brute forcing without lockout increases risk in poorly segmented or monitored networks. The lack of known exploits reduces immediate threat but patching remains critical to prevent future exploitation. Organizations with remote or distributed offices using these routers are particularly vulnerable if local network access controls are weak.

Mitigation Recommendations

1. Immediately upgrade all GL.Inet AX1800 routers to firmware version 4.8.2 or later to apply the vendor’s fix. 2. Implement strict network segmentation to isolate management interfaces from general user and guest networks, limiting local network access to trusted administrators only. 3. Deploy network monitoring and intrusion detection systems to identify unusual authentication attempts or brute force patterns targeting router interfaces. 4. Enforce strong, complex administrative passwords to increase brute force resistance. 5. Where possible, disable remote management or restrict it via VPN or secure channels. 6. Regularly audit router configurations and logs for signs of unauthorized access attempts. 7. Educate network administrators on the risks of local network attacks and the importance of patch management. 8. Consider additional multi-factor authentication mechanisms if supported by the router firmware or network architecture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fd2d12717593a3341ed5f

Added to database: 1/8/2026, 3:52:49 PM

Last enriched: 1/15/2026, 5:17:21 PM

Last updated: 2/7/2026, 12:08:09 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats