{"api_version":"1","generated_at":"2026-05-12T19:41:37+00:00","cve":"CVE-2023-33621","urls":{"html":"https://cve.report/CVE-2023-33621","api":"https://cve.report/api/cve/CVE-2023-33621.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-33621","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-33621"},"summary":{"title":"CVE-2023-33621","description":"GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-06-13 16:15:00","updated_at":"2023-06-23 19:18:00"},"problem_types":["CWE-294"],"metrics":[],"references":[{"url":"http://gl-ar750s-ext.com","name":"http://gl-ar750s-ext.com","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://glinet.com","name":"http://glinet.com","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"502"},{"url":"https://justinapplegate.me/2023/glinet-CVE-2023-33621/","name":"https://justinapplegate.me/2023/glinet-CVE-2023-33621/","refsource":"MISC","tags":[],"title":"CVE-2023-33621: GL.iNET Auth Token in GET Query String - Justin Applegate","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-33621","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33621","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"33621","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"gl-inet","cpe5":"gl-ar750s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"33621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"gl-inet","cpe5":"gl-ar750s_firmware","cpe6":"3.215","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-33621","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://glinet.com","refsource":"MISC","name":"http://glinet.com"},{"url":"http://gl-ar750s-ext.com","refsource":"MISC","name":"http://gl-ar750s-ext.com"},{"refsource":"MISC","name":"https://justinapplegate.me/2023/glinet-CVE-2023-33621/","url":"https://justinapplegate.me/2023/glinet-CVE-2023-33621/"}]}},"nvd":{"publishedDate":"2023-06-13 16:15:00","lastModifiedDate":"2023-06-23 19:18:00","problem_types":["CWE-294"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:gl-inet:gl-ar750s_firmware:3.215:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}