CVE-2025-2851
📋 TL;DR
A critical buffer overflow vulnerability in the RPC handler component of GL.iNet routers allows attackers to execute arbitrary code or crash devices. This affects multiple GL.iNet router models running firmware version 4.x. Attackers could potentially gain full control of affected devices.
💻 Affected Systems
- GL-A1300 Slate Plus
- GL-AR300M16 Shadow
- GL-AR300M Shadow
- GL-AR750 Creta
- GL-AR750S-EXT Slate
- GL-AX1800 Flint
- GL-AXT1800 Slate AX
- GL-B1300 Convexa-B
- GL-B3000 Marble
- GL-BE3600 Slate 7
- GL-E750
- GL-E750V2 Mudi
- GL-MT300N-V2 Mango
- GL-MT1300 Beryl
- GL-MT2500 Brume 2
- GL-MT3000 Beryl AX
- GL-MT6000 Flint 2
- GL-SFT1200 Opal
- GL-X300B Collie
- GL-X750 Spitz
- GL-X3000 Spitz AX
- GL-XE300 Puli
- GL-XE3000 Puli AX
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, credential theft, network pivoting, and persistent backdoor installation.
Likely Case
Device crash/reboot causing service disruption, or limited code execution for reconnaissance and lateral movement.
If Mitigated
Denial of service if exploit fails or is blocked by network controls, with no persistent impact.
🎯 Exploit Status
Buffer overflow in RPC handler suggests potential for remote exploitation without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions per model
Vendor Advisory: https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/
Restart Required: Yes
Instructions:
1. Access router admin interface. 2. Navigate to System > Upgrade. 3. Check for available firmware updates. 4. Download and install latest firmware. 5. Reboot router after installation.
🔧 Temporary Workarounds
Disable RPC Handler
linuxDisable the vulnerable RPC handler component if not required.
Check vendor documentation for specific RPC disable commands
Network Segmentation
allIsolate affected routers from critical networks and internet exposure.
🧯 If You Can't Patch
- Segment affected routers behind firewalls with strict inbound/outbound rules
- Implement network monitoring for unusual RPC traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router admin interface under System > Status
Check Version:
ssh admin@router-ip 'cat /etc/glversion' or check web interface
Verify Fix Applied:
Verify firmware version is updated beyond vulnerable 4.x range per vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual RPC handler crashes
- Buffer overflow error messages in system logs
- Unexpected process restarts
Network Indicators:
- Abnormal RPC protocol traffic to router management interface
- Unexpected outbound connections from router
SIEM Query:
source="router_logs" AND ("buffer overflow" OR "RPC handler" AND error)