CVE-2023-50919
CRITICAL EXPLOITEDGL.iNet Unauthenticated Remote Command Execution via the logread module.
Title source: metasploitDescription
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb
Scores
CVSS v3
9.8
EPSS
0.5226
EPSS Percentile
97.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-09-03
CWE
CWE-287
Status
published
Products (24)
gl-inet/gl-a1300_firmware
4.3.7
gl-inet/gl-a1300_firmware
4.4.6
gl-inet/gl-ar300m_firmware
4.3.7
gl-inet/gl-ar300m_firmware
4.4.6
gl-inet/gl-ar750_firmware
4.3.7
gl-inet/gl-ar750_firmware
4.4.6
gl-inet/gl-ar750s_firmware
4.3.7
gl-inet/gl-ar750s_firmware
4.4.6
gl-inet/gl-ax1800_firmware
4.3.7
gl-inet/gl-ax1800_firmware
4.4.6
... and 14 more
Published
Jan 12, 2024
Tracked Since
Feb 18, 2026