Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.exploit-db.com/exploits/51865 |
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet
Gl-inet glinet Devices |
|
| Vendors & Products |
Gl-inet
Gl-inet glinet Devices |
Fri, 08 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authentication Bypass via SQL Injection in GL.iNet 4.x Firmware Devices | |
| Weaknesses | CWE-284 |
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authentication Bypass via SQL Injection in GL.iNet 4.x Firmware Devices | |
| Weaknesses | CWE-284 CWE-89 |
Fri, 08 May 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular expression. For example, this affects version 4.3.7 on GL-MT3000 GL-AR300M GL-B1300 GL-AX1800 GL-AR750S GL-MT2500 GL-AXT1800 GL-X3000 and GL-SFT1200. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T18:59:23.304Z
Reserved: 2023-10-23T00:00:00.000Z
Link: CVE-2023-46453
Updated: 2026-05-08T18:55:34.508Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:27.850
Modified: 2026-05-08T20:16:28.533
Link: CVE-2023-46453
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:51:45Z