Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-5959

CVE-2026-5959: GL.iNet Router Auth Bypass Vulnerability

CVE-2026-5959 is an authentication bypass flaw in GL.iNet GL-RM1, GL-RM10, GL-RM10RC and GL-RM1PE routers affecting the Factory Reset Handler. This post covers technical details, affected versions, impact, and mitigation.

Published: April 9, 2026

CVE-2026-5959 Overview

A security flaw has been discovered in GL.iNet KVM devices including GL-RM1, GL-RM10, GL-RM10RC, and GL-RM1PE running firmware version 1.8.1. This vulnerability affects the Factory Reset Handler component, allowing attackers to bypass authentication mechanisms after a factory reset is performed. The vulnerability enables remote access without proper authentication, though the attack complexity is high and exploitation is considered difficult.

Critical Impact

Remote authentication bypass allows unauthorized access to GL.iNet KVM devices, potentially enabling attackers to gain full control over affected systems and connected infrastructure.

Affected Products

  • GL.iNet GL-RM1 firmware version 1.8.1
  • GL.iNet GL-RM10 firmware version 1.8.1
  • GL.iNet GL-RM10RC firmware version 1.8.1
  • GL.iNet GL-RM1PE firmware version 1.8.1

Discovery Timeline

  • April 9, 2026 - CVE-2026-5959 published to NVD
  • April 9, 2026 - Last updated in NVD database

Technical Details for CVE-2026-5959

Vulnerability Analysis

This authentication bypass vulnerability (CWE-287) exists within the Factory Reset Handler component of GL.iNet KVM devices. When a factory reset is performed on affected devices, the authentication mechanisms fail to properly reinitialize, creating a window of opportunity for unauthorized remote access. The vulnerability requires network access to exploit but demands a high level of attack complexity, making successful exploitation difficult but not impossible for determined attackers.

The flaw resides in how the device handles credential and session state during the factory reset process. Rather than properly invalidating existing sessions and requiring fresh authentication, the handler leaves the device in a vulnerable state where authentication checks can be circumvented.

Root Cause

The root cause stems from improper authentication implementation (CWE-287) in the Factory Reset Handler. The component fails to properly enforce authentication requirements after a reset operation, allowing network-accessible requests to bypass normal credential validation. This design flaw enables attackers who can reach the device over the network to gain unauthorized access without providing valid credentials.

Attack Vector

The attack is initiated remotely over the network, targeting the Factory Reset Handler component. An attacker with network access to the vulnerable device can exploit the improper authentication handling that occurs after a factory reset. While the attack vector is network-based, the high complexity involved means attackers require specific timing, knowledge of the device state, and potentially additional conditions to successfully exploit the vulnerability.

The exploitation scenario involves:

  1. Identifying a vulnerable GL.iNet KVM device on the network
  2. Triggering or waiting for a factory reset condition
  3. Exploiting the authentication bypass window before proper security state is restored
  4. Gaining unauthorized access to the device management interface

For detailed technical information about this vulnerability, refer to the GitHub CVE-issues Document maintained by GL.iNet.

Detection Methods for CVE-2026-5959

Indicators of Compromise

  • Unexpected or unauthorized access to KVM device management interfaces
  • Login events occurring without corresponding valid authentication attempts in device logs
  • Factory reset operations followed by immediate remote access from unknown IP addresses
  • Unusual network traffic patterns targeting KVM management ports

Detection Strategies

  • Monitor network traffic for unauthorized connections to GL.iNet KVM devices, particularly following factory reset events
  • Implement network segmentation to isolate KVM infrastructure and enable targeted monitoring
  • Deploy intrusion detection rules to identify authentication bypass attempts against affected device models
  • Review access logs for management interface connections that lack proper authentication trails

Monitoring Recommendations

  • Enable comprehensive logging on all GL.iNet KVM devices and forward logs to a centralized SIEM
  • Configure alerts for factory reset events on production KVM infrastructure
  • Monitor for firmware version 1.8.1 across device inventory to identify vulnerable systems
  • Implement network-level monitoring for management interface access patterns

How to Mitigate CVE-2026-5959

Immediate Actions Required

  • Upgrade all affected GL.iNet KVM devices to firmware version 1.8.2 or later immediately
  • Restrict network access to KVM device management interfaces to trusted administrative networks only
  • Audit recent access logs for signs of unauthorized access, particularly following any factory reset events
  • Implement network segmentation to limit exposure of vulnerable devices until patching is complete

Patch Information

GL.iNet has released firmware version 1.8.2 which resolves this authentication bypass vulnerability. The vendor was contacted early during the disclosure process, responded professionally, and quickly released the fixed version. Organizations should prioritize upgrading all affected devices to version 1.8.2 or later. The updated firmware can be obtained from the GL.iNet KVM Download page.

Workarounds

  • Implement strict network access controls to limit connectivity to KVM management interfaces
  • Place affected devices behind a VPN or firewall that requires authentication before network access
  • Disable remote management capabilities temporarily if immediate patching is not feasible
  • Monitor for and investigate any factory reset events on production devices
bash
# Network isolation configuration example (firewall rules)
# Restrict KVM management interface access to trusted admin network only
iptables -A INPUT -p tcp --dport 443 -s 10.0.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGlinet

  • SeverityHIGH

  • CVSS Score7.5

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-287
  • Technical References
  • GL.iNet KVM Download

  • GitHub CVE-issues Document

  • VulDB Submission #786688

  • VulDB Vulnerability #356512

  • VulDB CTI for #356512
  • Related CVEs
  • CVE-2026-26791: GL-iNet GL-AR300M16 RCE Vulnerability

  • CVE-2025-67091: GL.iNet AX1800 Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English