CVE-2025-44018

8.3 HIGH

📋 TL;DR

This CVE describes a firmware downgrade vulnerability in GL-Inet GL-AXT1800 routers where attackers can perform man-in-the-middle attacks to deliver malicious .tar files that force the device to install older, potentially vulnerable firmware versions. This affects users of GL-AXT1800 routers with firmware version 4.7.0 who perform OTA updates over untrusted networks.

💻 Affected Systems

Products:
  • GL-Inet GL-AXT1800
Versions: 4.7.0
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the OTA update functionality; devices must be configured to receive automatic or manual firmware updates.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could downgrade firmware to versions with known critical vulnerabilities, then chain exploits to gain full device control, intercept network traffic, or pivot to internal networks.

🟠

Likely Case

Attackers on the same network could downgrade firmware to versions with known exploits, potentially gaining administrative access to the router.

🟢

If Mitigated

With proper network segmentation and HTTPS verification, the attack surface is limited to attackers with privileged network access.

🌐 Internet-Facing: MEDIUM - Requires man-in-the-middle position, but routers often update over internet connections that could be intercepted.
🏢 Internal Only: HIGH - Attackers on the same network can easily perform man-in-the-middle attacks against local update traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires man-in-the-middle position and ability to intercept/modify OTA update traffic; no authentication needed to trigger the downgrade.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware > 4.7.0

Vendor Advisory: https://www.gl-inet.com/security/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to System > Firmware Upgrade. 3. Download latest firmware from official GL-Inet website. 4. Upload and install the firmware. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable automatic OTA updates

all

Prevent automatic firmware updates that could be intercepted

Log into admin interface > System > Firmware Upgrade > Disable 'Auto Update'

Use wired connections for updates

all

Perform firmware updates only over wired Ethernet connections to reduce MITM risk

🧯 If You Can't Patch

  • Segment router management traffic to dedicated VLAN separate from user traffic
  • Implement network monitoring for unexpected firmware version changes or downgrade attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface: System > Status > Firmware Version

Check Version:

ssh admin@router-ip 'cat /etc/glversion' or check web interface

Verify Fix Applied:

Verify firmware version is updated beyond 4.7.0 and attempt manual update from trusted source succeeds

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware downgrade events
  • OTA update failures or anomalies
  • Firmware version changes without administrator action

Network Indicators:

  • Unencrypted firmware download traffic
  • Unexpected .tar file transfers to router management interface
  • MITM patterns in update traffic

SIEM Query:

source="router_logs" AND ("firmware downgrade" OR "version rollback" OR "OTA failure")

🔗 References

📤 Share & Export