Check Point Reference: | CPAI-2024-1100 |
Date Published: | 4 Dec 2024 |
Severity: | Critical |
Last Updated: | Wednesday 04 December, 2024 |
Source: | |
Industry Reference: | CVE-2024-39226 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | GL-iNet AR750 firmware v4.3.11 GL-iNet AR750S firmware v4.3.11 GL-iNet AR300M firmware v4.3.11 GL-iNet AR300M16 firmware v4.3.11 GL-iNet MT300N-V2 firmware v4.3.11 GL-iNet B1300 firmware v4.3.11 GL-iNet MT1300 firmware v4.3.11 GL-iNet SFT1200 firmware v4.3.11 GL-iNet X750 firmware v4.3.11 GL-iNet MT3000 firmware v4.5.16 GL-iNet MT2500 firmware v4.5.16 GL-iNet AXT1800 firmware v4.5.16 GL-iNet AX1800 firmware v4.5.16 GL-iNet A1300 firmware v4.5.16 GL-iNet X300B firmware v4.5.16 GL-iNet XE300 firmware v4.3.16 GL-iNet E750 firmware v4.3.12 GL-iNet AP1300 firmware v4.3.13 GL-iNet S1300 firmware v4.3.13 GL-iNet XE3000 firmware v4.4.8 GL-iNet X3000 firmware v4.4.8 GL-iNet MT6000 firmware v4.5.8 GL-iNet AP1300 firmware v3.217 GL-iNet B2200 firmware v3.216 GL-iNet MV1000 firmware v3.216 GL-iNet MV1000W firmware v3.216 GL-iNet USB150 firmware v3.216 GL-iNet SF1200 firmware v3.216 GL-iNet N300 firmware v3.216 GL-iNet S1300 firmware v3.216 |
Vulnerability Description | A command injection vulnerability exists in multiple GL-iNet products. Successful exploitation could result in command execution within the context of the target user. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: GL-iNet Multiple Products Command Injection (CVE-2024-39226)