Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in GL-iNet GL-AR300M16 v4.3.11 via get_system_log |
Sat, 14 Mar 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:* cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gl-inet ar300m16
Gl-inet ar300m16 Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gl-inet
Gl-inet gl-ar300m16 |
|
| Vendors & Products |
Gl-inet
Gl-inet gl-ar300m16 |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the module parameter in the M.get_system_log function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-14T03:30:31.005Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26795
Updated: 2026-03-14T03:30:12.652Z
Status : Modified
Published: 2026-03-12T18:16:23.070
Modified: 2026-03-16T14:18:27.577
Link: CVE-2026-26795
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:36:25Z