CVE-2025-2851

8.0 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in the RPC handler component of GL.iNet routers allows attackers to execute arbitrary code or crash devices. This affects multiple GL.iNet router models running firmware version 4.x. Attackers could potentially gain full control of affected devices.

💻 Affected Systems

Products:
  • GL-A1300 Slate Plus
  • GL-AR300M16 Shadow
  • GL-AR300M Shadow
  • GL-AR750 Creta
  • GL-AR750S-EXT Slate
  • GL-AX1800 Flint
  • GL-AXT1800 Slate AX
  • GL-B1300 Convexa-B
  • GL-B3000 Marble
  • GL-BE3600 Slate 7
  • GL-E750
  • GL-E750V2 Mudi
  • GL-MT300N-V2 Mango
  • GL-MT1300 Beryl
  • GL-MT2500 Brume 2
  • GL-MT3000 Beryl AX
  • GL-MT6000 Flint 2
  • GL-SFT1200 Opal
  • GL-X300B Collie
  • GL-X750 Spitz
  • GL-X3000 Spitz AX
  • GL-XE300 Puli
  • GL-XE3000 Puli AX
Versions: 4.x firmware versions
Operating Systems: GL.iNet custom firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models with RPC handler enabled (typically default) are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, credential theft, network pivoting, and persistent backdoor installation.

🟠

Likely Case

Device crash/reboot causing service disruption, or limited code execution for reconnaissance and lateral movement.

🟢

If Mitigated

Denial of service if exploit fails or is blocked by network controls, with no persistent impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer overflow in RPC handler suggests potential for remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions per model

Vendor Advisory: https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/

Restart Required: Yes

Instructions:

1. Access router admin interface. 2. Navigate to System > Upgrade. 3. Check for available firmware updates. 4. Download and install latest firmware. 5. Reboot router after installation.

🔧 Temporary Workarounds

Disable RPC Handler

linux

Disable the vulnerable RPC handler component if not required.

Check vendor documentation for specific RPC disable commands

Network Segmentation

all

Isolate affected routers from critical networks and internet exposure.

🧯 If You Can't Patch

  • Segment affected routers behind firewalls with strict inbound/outbound rules
  • Implement network monitoring for unusual RPC traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System > Status

Check Version:

ssh admin@router-ip 'cat /etc/glversion' or check web interface

Verify Fix Applied:

Verify firmware version is updated beyond vulnerable 4.x range per vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual RPC handler crashes
  • Buffer overflow error messages in system logs
  • Unexpected process restarts

Network Indicators:

  • Abnormal RPC protocol traffic to router management interface
  • Unexpected outbound connections from router

SIEM Query:

source="router_logs" AND ("buffer overflow" OR "RPC handler" AND error)

🔗 References

📤 Share & Export