Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code

admin by admin
Feb 19, 2024
in News
A A
0

A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit to gain remote access and unauthorized access to restricted files. 

If these vulnerabilities are not fixed, they could potentially result in significant security breaches. It is imperative to address them promptly to prevent any potential damage.

During their security assessment, Hadess security researchers discovered a vulnerability identified as CVE-2023-47464 in GL-AX1800 routers.

The GL-AX1800 is a dual-band router that uses Wi-Fi 6 technology to support high-speed data transmission, mass device connectivity, and ultra-low latency gaming. 

It is designed to meet the demanding needs of users who require fast and reliable connectivity for their heavy-duty applications. 

Attack Vectors With GL-AX1800 Router

  • Susceptible to CSRF attacks
  • Permits insecure file uploads
  • Suffers path traversal vulnerability
  • File overwrite vulnerability leads to RCE
  • Unrestricted File Access Download

As highlighted by researchers, timely resolution of vulnerabilities is crucial to ensure user safety in network devices. 

They emphasized the significance of proactive security measures in designing and maintaining such devices.

The convergence of these vulnerabilities presents a range of potential threats, such as exposing sensitive data, facilitating unauthorized access to networks, and enabling the deployment of malicious software and ransomware.

Hadess has released a Proof of Concept (PoC), which showcases the exploitation of the CVE-2023-47464 vulnerability.

The GL-AX1800 routers running on Firmware Version 4.0.0 are susceptible to a vulnerability addressed in the latest version, 4.5.0.

To ensure protection against cyber attacks, it is highly recommended for users to upgrade to the latest version of Firmware. The updated Firmware can be downloaded from the provided link.

In the current era of digital advancements, as soon as a vulnerability is discovered and a proof-of-concept (PoC) is made available, there is a sudden surge in the number of attacks that exploit it. 

The Citrixbleed vulnerability is a security flaw that can be accessed once the Proof of Concept (POC) is released. This vulnerability has been exploited in real-world situations.

This emphasizes the need for prompt patching and security measures to safeguard against potential threats.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.