Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26795: n/a

0
Critical
VulnerabilityCVE-2026-26795cvecve-2026-26795
Published: Thu Mar 12 2026 (03/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the module parameter in the M.get_system_log function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:21:49 UTC

Technical Analysis

CVE-2026-26795 is a critical command injection vulnerability affecting the GL-iNet GL-AR300M16 router running firmware version 4.3.11. The vulnerability resides in the M.get_system_log function, specifically through the module parameter, which fails to properly sanitize user input. This allows an attacker to inject arbitrary commands that the system executes with the privileges of the affected service, potentially leading to full system compromise. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score of 9.8 reflects its critical nature, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The impact includes complete compromise of confidentiality, integrity, and availability of the device. The underlying weakness corresponds to CWE-77, indicating improper neutralization of special elements in commands or queries. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The GL-iNet GL-AR300M16 is a widely used compact router, often deployed in small offices, home networks, and IoT environments, increasing the potential attack surface. Lack of available patches at the time of disclosure further elevates the risk.

Potential Impact

The exploitation of CVE-2026-26795 can lead to complete compromise of affected GL-iNet GL-AR300M16 devices. Attackers can execute arbitrary commands remotely without authentication, enabling them to take full control of the router. This can result in interception or manipulation of network traffic, deployment of malware or ransomware, pivoting to internal networks, and disruption of network availability. Organizations relying on these routers for critical connectivity or IoT device management face risks of data breaches, operational downtime, and loss of network integrity. The vulnerability’s ease of exploitation and high severity make it a prime target for attackers seeking to establish persistent footholds or conduct espionage. The absence of known exploits currently does not reduce the threat, as proof-of-concept code may emerge rapidly. The impact extends to confidentiality, integrity, and availability, potentially affecting business continuity and trust in network infrastructure.

Mitigation Recommendations

1. Immediately isolate affected GL-iNet GL-AR300M16 devices from untrusted networks until a patch or firmware update is available. 2. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from these devices. 3. Implement network segmentation to limit exposure of vulnerable routers to critical internal systems. 4. Employ strict access control lists (ACLs) and firewall rules to restrict management interface access to trusted IP addresses only. 5. Regularly check GL-iNet official channels for firmware updates or security advisories addressing this vulnerability. 6. If patching is not immediately possible, consider replacing affected devices with models not impacted by this vulnerability. 7. Conduct thorough audits of network devices for signs of compromise, especially focusing on routers with similar firmware versions. 8. Educate network administrators about the risks of command injection vulnerabilities and the importance of input validation in device management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b302c82f860ef943d65df0

Added to database: 3/12/2026, 6:15:36 PM

Last enriched: 3/20/2026, 2:21:49 AM

Last updated: 4/28/2026, 5:10:14 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses