CVE-2026-26792
Published: 12 March 2026
Description
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection vulnerabilities in the set_upgrade function via the modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type parameters. These vulnerabilities allow attackers to execute arbitrary commands via a crafted input.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires information input validation at entry points like the set_upgrade parameters, directly preventing command injection vulnerabilities by sanitizing crafted inputs such as modem_url and firmware_upload.
SI-2 mandates identification, reporting, and timely remediation of flaws like these command injections in the GL-AR300M16 firmware, eliminating the vulnerability through patching.
AC-3 enforces logical access controls on the vulnerable set_upgrade function, preventing unauthenticated remote attackers from supplying malicious parameters.
Security SummaryAI
CVE-2026-26792 involves multiple command injection vulnerabilities (CWE-77) in the GL-iNet GL-AR300M16 router running firmware version v4.3.11. The flaws exist in the set_upgrade function and can be triggered via crafted inputs to the parameters modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type. These issues allow attackers to execute arbitrary commands on the affected device.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low complexity, no required privileges or user interaction, and high impacts on confidentiality, integrity, and availability. Remote attackers can leverage these command injections during firmware upgrade operations to run unauthorized commands, potentially leading to full device compromise.
Additional technical details, including a proof-of-concept, are documented in the GitHub repository at https://github.com/sezangel/IOT-vul/tree/main/GL-iNet/GL-AR300M16/set_upgrade. No vendor advisories or patches are referenced in the available information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of a public-facing router web interface (T1190) via command injection parameters, directly facilitating arbitrary Unix shell command execution (T1059.004).