CVE-2026-26793
Published: 12 March 2026
Description
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires information input validation at system entry points, directly preventing command injection by sanitizing or rejecting crafted inputs to the vulnerable set_config function.
AC-3 enforces approved access authorizations, blocking unauthenticated network attackers from invoking the vulnerable set_config function.
SI-2 requires timely flaw remediation, directly addressing this command injection vulnerability through patching the affected firmware.
Security SummaryAI
CVE-2026-26793 is a command injection vulnerability affecting the GL-iNet GL-AR300M16 router on firmware version 4.3.11. The flaw exists in the set_config function, which fails to properly sanitize inputs, enabling attackers to execute arbitrary commands through crafted input. Published on 2026-03-12, it is classified under CWE-77 (Command Injection) with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.
The vulnerability is exploitable by unauthenticated attackers over the network with low attack complexity and no user interaction required. Successful exploitation grants remote code execution on the device, potentially allowing full compromise including data theft, modification of configurations, or disruption of network services.
A reference implementation detailing the vulnerability is available at https://github.com/sezangel/IOT-vul/tree/main/GL-iNet/GL-AR300M16/set_config. No vendor advisories or patches are specified in available information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a command injection (CWE-77) in a public-facing router config function, enabling unauthenticated remote code execution via Unix shell, directly mapping to T1190 (Exploit Public-Facing Application) and T1059.004 (Unix Shell).