Cyber Posture

CVE-2025-67089

HighPublic PoCRCE

Published: 08 January 2026

Published
08 January 2026
Modified
16 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0036 58.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67089 is a high-severity Command Injection (CWE-77) vulnerability in Gl-Inet Gl-Axt1800 Firmware. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 41.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation and sanitization of user-supplied package names in the plugins.install_package RPC method to directly prevent command injection.

prevent

Mandates timely identification, reporting, and correction of the input sanitization flaw in the router firmware to remediate the vulnerability.

prevent

Enforces least privilege on processes handling RPC calls, limiting the scope and impact of arbitrary root command execution if injection occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in remote RPC method (plugins.install_package) enables exploitation of remote service (T1210) for arbitrary root command execution (T1059.004 Unix Shell) and privilege escalation from low privileges to root (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands…

more

with root privileges

Deeper analysisAI

CVE-2025-67089, published on 2026-01-08, is a command injection vulnerability (CWE-77) affecting the GL-iNet GL-AXT1800 router firmware version v4.6.8. The flaw exists in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names, enabling the injection of malicious commands.

Authenticated attackers with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation allows execution of arbitrary commands with root privileges, resulting in high confidentiality and integrity impacts but no availability disruption (CVSS:3.1 score of 8.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

Advisories and mitigation guidance are provided on the vendor's security updates page at https://www.gl-inet.com/security-updates/, along with a detailed researcher analysis at https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub.

Details

CWE(s)

Affected Products

gl-inet
gl-axt1800 firmware
4.2.0, 4.6.4, 4.6.8

CVEs Like This One

CVE-2026-26793Same vendor: Gl-Inet
CVE-2026-26792Same vendor: Gl-Inet
CVE-2026-26791Same vendor: Gl-Inet
CVE-2026-26795Same vendor: Gl-Inet
CVE-2026-20186Shared CWE-77
CVE-2026-35682Shared CWE-77
CVE-2024-53412Shared CWE-77
CVE-2025-33180Shared CWE-77
CVE-2025-57105Shared CWE-77
CVE-2025-33181Shared CWE-77

References