Cyber Posture

CVE-2026-26793

CriticalPublic PoCRCE

Published: 12 March 2026

Published
12 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0111 78.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26793 is a critical-severity Command Injection (CWE-77) vulnerability in Gl-Inet Ar300M16 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires information input validation at system entry points, directly preventing command injection by sanitizing or rejecting crafted inputs to the vulnerable set_config function.

prevent

AC-3 enforces approved access authorizations, blocking unauthenticated network attackers from invoking the vulnerable set_config function.

prevent

SI-2 requires timely flaw remediation, directly addressing this command injection vulnerability through patching the affected firmware.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is a command injection (CWE-77) in a public-facing router config function, enabling unauthenticated remote code execution via Unix shell, directly mapping to T1190 (Exploit Public-Facing Application) and T1059.004 (Unix Shell).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

Deeper analysisAI

CVE-2026-26793 is a command injection vulnerability affecting the GL-iNet GL-AR300M16 router on firmware version 4.3.11. The flaw exists in the set_config function, which fails to properly sanitize inputs, enabling attackers to execute arbitrary commands through crafted input. Published on 2026-03-12, it is classified under CWE-77 (Command Injection) with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

The vulnerability is exploitable by unauthenticated attackers over the network with low attack complexity and no user interaction required. Successful exploitation grants remote code execution on the device, potentially allowing full compromise including data theft, modification of configurations, or disruption of network services.

A reference implementation detailing the vulnerability is available at https://github.com/sezangel/IOT-vul/tree/main/GL-iNet/GL-AR300M16/set_config. No vendor advisories or patches are specified in available information.

Details

CWE(s)

Affected Products

gl-inet
ar300m16 firmware
4.3.11

CVEs Like This One

CVE-2026-26792Same product: Gl-Inet Ar300M16
CVE-2026-26791Same product: Gl-Inet Ar300M16
CVE-2026-26795Same product: Gl-Inet Ar300M16
CVE-2026-26794Same product: Gl-Inet Ar300M16
CVE-2025-67089Same vendor: Gl-Inet
CVE-2024-43028Shared CWE-77
CVE-2026-31175Shared CWE-77
CVE-2025-50722Shared CWE-77
CVE-2024-54007Shared CWE-77
CVE-2025-50526Shared CWE-77

References