A vulnerability in GL.iNET GL-E750 Mudi before firmware v3.216 allows authenticated attackers to execute arbitrary code via a crafted POST request.
References
| Link | Resource |
|---|---|
| https://justinapplegate.me/2023/glinet-CVE-2023-24261/ | Exploit Third Party Advisory |
| https://justinapplegate.me/2023/glinet-CVE-2023-24261/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 07:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://justinapplegate.me/2023/glinet-CVE-2023-24261/ - Exploit, Third Party Advisory |
28 Jun 2023, 15:57
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-21 21:15
Updated : 2024-12-06 20:15
NVD link : CVE-2023-24261
Mitre link : CVE-2023-24261
CVE.ORG link : CVE-2023-24261
JSON object : View
Products Affected
gl-inet
- gl-e750_firmware
- gl-e750
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
