Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 14 Mar 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:* cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet
Gl-inet gl-ar300m16 |
|
| Vendors & Products |
Gl-inet
Gl-inet gl-ar300m16 |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection vulnerabilities in the set_upgrade function via the modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type parameters. These vulnerabilities allow attackers to execute arbitrary commands via a crafted input. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-14T03:26:25.162Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26792
Updated: 2026-03-14T03:26:18.140Z
Status : Modified
Published: 2026-03-12T18:16:22.817
Modified: 2026-03-16T14:18:27.230
Link: CVE-2026-26792
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:36:28Z