CVE-2024-45259

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to delete arbitrary files on affected GL-iNet router devices by intercepting HTTP requests and manipulating the filename parameter in the download interface. Attackers can exploit this to disrupt device functionality or potentially escalate privileges. Users of specific GL-iNet router models running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • GL-iNet MT6000
  • GL-iNet MT3000
  • GL-iNet MT2500
  • GL-iNet AXT1800
  • GL-iNet AX1800
Versions: 4.6.2
Operating Systems: GL-iNet custom firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web management interface accessible are vulnerable. The vulnerability requires access to the device's HTTP interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise through deletion of critical system files, leading to persistent denial of service, privilege escalation, or device bricking requiring physical recovery.

🟠

Likely Case

Service disruption through deletion of configuration files, logs, or web interface components, causing temporary device unavailability until manual intervention.

🟢

If Mitigated

Limited impact if network segmentation prevents attacker access to management interface, with only authorized users able to trigger the vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires HTTP request interception/modification capability. The GitHub reference contains technical details demonstrating the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GL-iNet firmware updates > 4.6.2

Vendor Advisory: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md

Restart Required: Yes

Instructions:

1. Log into GL-iNet web interface. 2. Navigate to System > Firmware Upgrade. 3. Check for available updates. 4. Download and install latest firmware. 5. Reboot device after installation.

🔧 Temporary Workarounds

Disable Web Management Interface

linux

Prevent HTTP access to the vulnerable interface

uci set glconfig.remote.enable='0'
uci commit glconfig
/etc/init.d/glconfig restart

Network Segmentation

linux

Restrict access to router management interface

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the router's management interface
  • Monitor for unusual file deletion activity and maintain regular device configuration backups

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Status) or SSH command: cat /etc/glversion

Check Version:

cat /etc/glversion

Verify Fix Applied:

Confirm firmware version is greater than 4.6.2 and test that filename parameter manipulation no longer allows arbitrary file deletion

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to download interface with modified filename parameters
  • Unexpected file deletion events in system logs

Network Indicators:

  • HTTP traffic to router management interface with manipulated download parameters
  • Unusual file access patterns via HTTP

SIEM Query:

source="router_logs" AND (url_path="/cgi-bin/download" OR url_path="/download") AND (filename CONTAINS "/" OR filename CONTAINS "..")

🔗 References

📤 Share & Export