Cyber Posture

CVE-2025-67089

HighPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
16 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0034 56.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands…

more

with root privileges

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation and sanitization of user-supplied package names in the plugins.install_package RPC method to directly prevent command injection.

prevent

Mandates timely identification, reporting, and correction of the input sanitization flaw in the router firmware to remediate the vulnerability.

prevent

Enforces least privilege on processes handling RPC calls, limiting the scope and impact of arbitrary root command execution if injection occurs.

Security SummaryAI

CVE-2025-67089, published on 2026-01-08, is a command injection vulnerability (CWE-77) affecting the GL-iNet GL-AXT1800 router firmware version v4.6.8. The flaw exists in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names, enabling the injection of malicious commands.

Authenticated attackers with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation allows execution of arbitrary commands with root privileges, resulting in high confidentiality and integrity impacts but no availability disruption (CVSS:3.1 score of 8.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

Advisories and mitigation guidance are provided on the vendor's security updates page at https://www.gl-inet.com/security-updates/, along with a detailed researcher analysis at https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub.

Details

CWE(s)

Affected Products

gl-inet
gl-axt1800 firmware
4.2.0, 4.6.4, 4.6.8

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in remote RPC method (plugins.install_package) enables exploitation of remote service (T1210) for arbitrary root command execution (T1059.004 Unix Shell) and privilege escalation from low privileges to root (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References