CVE-2026-26793

GL-iNet · GL-AR300M16

The GL-iNet GL-AR300M16 router contains a command injection vulnerability in the `set_config` function, allowing for arbitrary command execution.

Executive summary

A critical command injection vulnerability in GL-iNet GL-AR300M16 routers allows attackers to execute arbitrary commands and gain full control over the device.

Vulnerability

The set_config function in the router's firmware fails to properly sanitize user input, leading to a command injection vulnerability. An attacker can provide crafted input to execute arbitrary system commands on the router.

Business impact

A successful exploit grants the attacker full administrative control over the router. With a CVSS score of 9.8, this allows for persistent network monitoring, traffic redirection, and a foothold for lateral movement within the local network. This is particularly dangerous for remote offices or small businesses relying on these devices for secure connectivity.

Remediation

Immediate Action: Update the GL-iNet firmware to the latest available version that includes a fix for the set_config function.

Proactive Monitoring: Monitor the router for unauthorized configuration changes or unusual outbound traffic that might indicate a compromised device.

Compensating Controls: Disable remote management interfaces and ensure that access to the router's web interface is restricted to trusted local devices only.

Exploitation status

Public Exploit Available: No

Analyst recommendation

It is critical to update the firmware on all affected GL-iNet devices immediately. Given the role of routers in network security, a compromise at this level can undermine all other security controls within the environment.