CVE-2025-25685

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to download arbitrary files from GL-INet Beryl AX GL-MT3000 routers by exploiting symbolic link manipulation on external Samba shares. Attackers can access sensitive system files, configuration data, and potentially credentials. This affects users of GL-INet Beryl AX GL-MT3000 routers with external drives configured as Samba shares.

💻 Affected Systems

Products:
  • GL-INet Beryl AX GL-MT3000
Versions: v4.7.0
Operating Systems: GL-INet custom firmware
Default Config Vulnerable: ✅ No
Notes: Requires external drive configured as Samba share. Default configuration does not enable Samba shares on external drives.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with access to all files including configuration, credentials, and sensitive system files, potentially leading to network takeover or data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive router configuration files, credentials, and system information that could enable further attacks.

🟢

If Mitigated

Limited file access restricted to non-critical directories if proper access controls and monitoring are implemented.

🌐 Internet-Facing: MEDIUM - Requires Samba share to be exposed to internet, which is not default but possible if misconfigured.
🏢 Internal Only: HIGH - Attackers on the local network can exploit this vulnerability if they have access to the Samba share.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have write access to external drive to create symbolic links, then access Samba share to traverse file system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.7.1 or later

Vendor Advisory: https://www.gl-inet.com/security/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to System > Firmware. 3. Check for updates. 4. If v4.7.1 or later is available, click Upgrade. 5. Wait for router to reboot automatically.

🔧 Temporary Workarounds

Disable Samba shares on external drives

all

Remove or disable Samba sharing functionality for external drives

Navigate to Network > Samba in admin interface and disable external drive sharing

Remove external drives

all

Physically disconnect external drives from router

🧯 If You Can't Patch

  • Disable Samba sharing completely in router settings
  • Implement network segmentation to isolate router from untrusted networks
  • Monitor Samba access logs for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System > Firmware. If version is exactly v4.7.0 and external Samba share is enabled, system is vulnerable.

Check Version:

ssh admin@router_ip 'cat /etc/glversion' or check web interface

Verify Fix Applied:

Verify firmware version is v4.7.1 or later in System > Firmware. Test that Samba share no longer allows traversal via symbolic links.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Samba file access patterns
  • Access to system files via Samba
  • Multiple failed access attempts to sensitive paths

Network Indicators:

  • SMB protocol traffic to router on port 445
  • Unusual file download patterns from router

SIEM Query:

source="router_logs" AND (protocol="SMB" OR service="samba") AND (path="*../*" OR path="*/etc/*" OR path="*/root/*")

🔗 References

📤 Share & Export