CVE-2023-47463

9.8 CRITICAL

📋 TL;DR

This CVE describes an unauthenticated remote code execution vulnerability in GL.iNet AX1800 routers. Attackers can execute arbitrary code without authentication by sending a crafted script to the gl_nas_sys authentication function. All users running affected firmware versions are vulnerable to complete system compromise.

💻 Affected Systems

Products:
  • GL.iNet AX1800 router
Versions: 4.0.0 through 4.4.x (before 4.5.0)
Operating Systems: GL.iNet custom firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover: attacker gains root access, installs persistent malware, pivots to internal networks, and exfiltrates sensitive data.

🟠

Likely Case

Router compromise leading to man-in-the-middle attacks, credential theft, network surveillance, and botnet recruitment.

🟢

If Mitigated

Limited impact with proper network segmentation and firewall rules preventing external access to vulnerable services.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if they reach the vulnerable service, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed exploitation information. The vulnerability requires sending crafted requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.0 and later

Vendor Advisory: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/an%20unauthenticated%20remote%20code%20execution.md

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to System > Firmware Upgrade. 3. Check for updates and install version 4.5.0 or later. 4. Reboot router after installation completes.

🔧 Temporary Workarounds

Disable WAN access to admin interface

all

Prevent external access to vulnerable authentication function by disabling WAN administration

Navigate to router admin interface > System > Administration > Disable 'Allow WAN Access'

Network segmentation and firewall rules

all

Isolate router management interface from untrusted networks

Configure firewall to block external access to router management ports (typically 80, 443, 22)

🧯 If You Can't Patch

  • Immediately isolate affected routers from internet access using firewall rules
  • Implement strict network segmentation to limit lateral movement if router is compromised

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System > Firmware. If version is between 4.0.0 and 4.4.x, device is vulnerable.

Check Version:

ssh admin@router-ip 'cat /etc/glversion' or check web interface

Verify Fix Applied:

After updating, verify firmware version shows 4.5.0 or later in System > Firmware section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to gl_nas_sys function
  • Unexpected process execution or system modifications
  • Failed login attempts followed by successful command execution

Network Indicators:

  • HTTP/HTTPS requests to router management interface containing script payloads
  • Unusual outbound connections from router to external IPs

SIEM Query:

source="router-logs" AND ("gl_nas_sys" OR "unauthorized access" OR "command injection")

🔗 References

📤 Share & Export