cve-2025-2850
Vulnerability from cvelistv5
Published
2025-04-26 07:31
Modified
2025-04-28 18:09
Severity ?
5.1 (Medium) - CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3.5 (Low) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.5 (Low) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.5 (Low) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.5 (Low) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS score ?
Summary
GL.iNet GL-A1300 Slate Plus Download Interface improper authorization
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2850", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-28T18:07:02.103624Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-28T18:09:52.772Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Download Interface" ], "product": "GL-A1300 Slate Plus", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AR300M16 Shadow", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AR300M Shadow", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AR750 Creta", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AR750S-EXT Slate", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AX1800 Flint", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-AXT1800 Slate AX", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-B1300 Convexa-B", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-B3000 Marble", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-BE3600 Slate 7", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-E750", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-E750V2 Mudi", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-MT300N-V2 Mango", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-MT1300 Beryl", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-MT2500 Brume 2", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-MT3000 Beryl AX", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-MT6000 Flint 2", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-SFT1200 Opal", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-X300B Collie", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-X750 Spitz", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-X3000 Spitz AX", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-XE300 Puli", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "modules": [ "Download Interface" ], "product": "GL-XE3000 Puli AX", "vendor": "GL.iNet", "versions": [ { "status": "affected", "version": "4.x" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been rated as problematic. This issue affects some unknown processing of the component Download Interface. The manipulation leads to improper authorization. It is recommended to upgrade the affected component." }, { "lang": "de", "value": "Eine Schwachstelle wurde in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x ausgemacht. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Download Interface. Durch die Manipulation mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 2.7, "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-266", "description": "Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-26T07:31:03.631Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-306287 | GL.iNet GL-A1300 Slate Plus Download Interface improper authorization", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.306287" }, { "name": "VDB-306287 | CTI Indicators (IOB, IOC, TTP)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.306287" }, { "tags": [ "patch" ], "url": "https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/" } ], "timeline": [ { "lang": "en", "time": "2025-04-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-26T08:38:33.000Z", "value": "VulDB entry last update" } ], "title": "GL.iNet GL-A1300 Slate Plus Download Interface improper authorization" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2850", "datePublished": "2025-04-26T07:31:03.631Z", "dateReserved": "2025-03-27T06:21:21.419Z", "dateUpdated": "2025-04-28T18:09:52.772Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-2850\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-04-26T08:15:14.500\",\"lastModified\":\"2025-04-29T13:52:10.697\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been rated as problematic. This issue affects some unknown processing of the component Download Interface. The manipulation leads to improper authorization. It is recommended to upgrade the affected component.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad en GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX. GL-XE300 Puli y GL-XE3000 Puli AX 4.x. Se ha clasificado como problem\u00e1tico. Este problema afecta a un procesamiento desconocido del componente Interfaz de Descarga. Esta manipulaci\u00f3n provoca una autorizaci\u00f3n incorrecta. Se recomienda actualizar el componente afectado.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":2.7,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":5.1,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-266\"},{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"references\":[{\"url\":\"https://vuldb.com/?ctiid.306287\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?id.306287\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/\",\"source\":\"cna@vuldb.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.