GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
References
Link Resource
http://gl-ar750s-ext.com Broken Link
http://glinet.com Broken Link
https://justinapplegate.me/2023/glinet-CVE-2023-33621/ Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2023-06-13T00:00:00

Updated: 2023-06-13T00:00:00

Reserved: 2023-05-22T00:00:00


Link: CVE-2023-33621

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-06-13T16:15:13.027

Modified: 2023-06-23T19:18:31.097


Link: CVE-2023-33621

JSON object: View

cve-icon Redhat Information

No data.

CWE