CVE-2025-67089
Published: 08 January 2026
Description
A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands…
more
with root privileges
Mitigating Controls (NIST 800-53 r5)AI
Requires validation and sanitization of user-supplied package names in the plugins.install_package RPC method to directly prevent command injection.
Mandates timely identification, reporting, and correction of the input sanitization flaw in the router firmware to remediate the vulnerability.
Enforces least privilege on processes handling RPC calls, limiting the scope and impact of arbitrary root command execution if injection occurs.
Security SummaryAI
CVE-2025-67089, published on 2026-01-08, is a command injection vulnerability (CWE-77) affecting the GL-iNet GL-AXT1800 router firmware version v4.6.8. The flaw exists in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names, enabling the injection of malicious commands.
Authenticated attackers with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation allows execution of arbitrary commands with root privileges, resulting in high confidentiality and integrity impacts but no availability disruption (CVSS:3.1 score of 8.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Advisories and mitigation guidance are provided on the vendor's security updates page at https://www.gl-inet.com/security-updates/, along with a detailed researcher analysis at https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in remote RPC method (plugins.install_package) enables exploitation of remote service (T1210) for arbitrary root command execution (T1059.004 Unix Shell) and privilege escalation from low privileges to root (T1068).