Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection Vulnerability in GL‑iNet GL‑AR300M16 v4.3.11 |
Sat, 14 Mar 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:* cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet
Gl-inet gl-ar300m16 |
|
| Vendors & Products |
Gl-inet
Gl-inet gl-ar300m16 |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the string port parameter in the enable_echo_server function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-14T03:23:33.407Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26791
Updated: 2026-03-14T03:23:27.424Z
Status : Modified
Published: 2026-03-12T18:16:22.690
Modified: 2026-03-16T14:18:27.057
Link: CVE-2026-26791
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:36:29Z