CVE-2025-45988
BaseFortify
Publication date: 2025-06-13
Last updated on: 2025-07-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| b-link | bl-wr9000_firmware | 2.4.9 |
| b-link | bl-wr9000 | * |
| b-link | bl-ac1900_firmware | 1.0.2 |
| b-link | bl-ac1900 | * |
| b-link | bl-ac2100_az3_firmware | 1.0.4 |
| b-link | bl-ac2100_az3 | * |
| b-link | bl-x10_ac8_firmware | 1.0.5 |
| b-link | bl-x10_ac8 | * |
| b-link | bl-lte300_firmware | 1.2.3 |
| b-link | bl-lte300 | * |
| b-link | bl-f1200_at1_firmware | 1.0.0 |
| b-link | bl-f1200_at1 | * |
| b-link | bl-x26_ac8_firmware | 1.2.8 |
| b-link | bl-x26_ac8 | * |
| b-link | blac450m_ae4_firmware | 4.0.0 |
| b-link | blac450m_ae4 | * |
| b-link | bl-x26_da3_firmware | 1.2.7 |
| b-link | bl-x26_da3 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw found in certain Blink routers. It occurs via the 'cmd' parameter in the bs_SetCmd function, allowing attackers to inject and execute unauthorized commands on the device. [1]
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute unauthorized commands on the affected router, potentially compromising the device's security and control, which may lead to unauthorized access, data breaches, or disruption of network services. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for the use of the "LB-LINK_cmd" command, which is exploited for unauthorized command injection. Network or system administrators can look for unusual or unauthorized invocations of this command in device logs or network traffic. Specific commands to detect this might include searching logs for "LB-LINK_cmd" usage or capturing network packets that contain this command to identify potential exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable devices, especially limiting access to the interface that accepts the "LB-LINK_cmd" command. Applying any available firmware updates or patches from the vendor that address this command injection vulnerability is critical. Additionally, monitoring and blocking unauthorized use of the "LB-LINK_cmd" command can help prevent exploitation. [1]