CVE-2025-67090

5.1 MEDIUM

📋 TL;DR

The LuCI web interface on GL.Inet AX1800 routers lacks rate limiting or account lockout mechanisms on the authentication endpoint, allowing unauthenticated attackers on the local network to perform unlimited password attempts against the admin interface. This vulnerability affects GL.Inet AX1800 routers running firmware versions 4.6.4 and 4.6.8.

💻 Affected Systems

Products:
  • GL.Inet AX1800
Versions: 4.6.4 and 4.6.8
Operating Systems: GL.Inet firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the LuCI web interface on the specified router models and firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could brute-force the admin password, gain full administrative control of the router, and potentially pivot to other network devices or intercept/modify network traffic.

🟠

Likely Case

Local network attackers could gain admin access through password brute-forcing, enabling them to change router settings, intercept traffic, or install malicious firmware.

🟢

If Mitigated

With proper network segmentation and access controls, the attack surface is limited to authorized local network segments only.

🌐 Internet-Facing: LOW - The vulnerability requires local network access to the router's web interface.
🏢 Internal Only: HIGH - Any attacker with access to the local network can exploit this vulnerability without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access and basic brute-forcing tools. No authentication is required to attempt password guesses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.2

Vendor Advisory: https://www.gl-inet.com/security/

Restart Required: Yes

Instructions:

1. Log into the router admin interface. 2. Navigate to System > Upgrade. 3. Upload firmware version 4.8.2. 4. Wait for upgrade to complete and router to reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the router management interface to a dedicated VLAN or restrict access to trusted IP addresses only.

Strong Password Enforcement

all

Use a long, complex admin password that is resistant to brute-force attacks.

🧯 If You Can't Patch

  • Implement network access controls to restrict access to the router's web interface (port 80/443) to trusted devices only.
  • Change the admin password to a long, complex passphrase that would be difficult to brute-force.

🔍 How to Verify

Check if Vulnerable:

Check the router firmware version via the web interface at System > Status. If version is 4.6.4 or 4.6.8, the device is vulnerable.

Check Version:

Connect to router web interface and navigate to System > Status page

Verify Fix Applied:

After upgrading, verify the firmware version shows 4.8.2 or higher in System > Status.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from the same IP address
  • Unusual authentication patterns to /cgi-bin/luci endpoint

Network Indicators:

  • High volume of HTTP POST requests to /cgi-bin/luci from single source
  • Brute-force tool patterns in HTTP traffic

SIEM Query:

source="router_logs" AND (url="/cgi-bin/luci" AND status="401") | stats count by src_ip | where count > 10

🔗 References

📤 Share & Export