We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2811

GL.iNet GL-A1300 Slate Plus API redos



Description

EN DE

A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to inefficient regular expression complexity. It is recommended to upgrade the affected component.

In GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalität der Komponente API. Mit der Manipulation mit unbekannten Daten kann eine inefficient regular expression complexity-Schwachstelle ausgenutzt werden. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.

Reserved 2025-03-26 | Published 2025-04-26 | Updated 2025-04-28 | Assigner VulDB


MEDIUM: 6.9CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 5.7CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
MEDIUM: 5.7CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5AV:A/AC:L/Au:S/C:N/I:N/A:C

Problem types

Inefficient Regular Expression Complexity

Resource Consumption

Product status

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

4.x
affected

Timeline

2025-04-26:Advisory disclosed
2025-04-26:VulDB entry created
2025-04-26:VulDB entry last update

Credits

pan.li (VulDB User) reporter

References

vuldb.com/?id.306286 (VDB-306286 | GL.iNet GL-A1300 Slate Plus API redos) vdb-entry

vuldb.com/?ctiid.306286 (VDB-306286 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.524459 (Submit #524459 | glinet MT6000 /MT3000 /MT2500 /AXT1800 /AX1800 /B3000 /A1300 /X300B /X3000 /XE3000 /X750 /SFT1200 /MT1300 /E750 /XE300 /AR750 /AR750S / v4.x Large or infinite loop) third-party-advisory

github.com/...aracter parameter results in 100% CPU usage.md related

www.gl-inet.com/...ies-vulnerabilities-and-cves-apr-24-2025/ patch

cve.org (CVE-2025-2811)

nvd.nist.gov (CVE-2025-2811)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-2811

Support options

Helpdesk Chat, Email, Knowledgebase