CVE-2025-45988
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-13

Last updated on: 2025-07-10

Assigner: MITRE

Description
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-13
Last Modified
2025-07-10
Generated
2026-05-07
AI Q&A
2025-06-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 18 associated CPEs
Vendor Product Version / Range
b-link bl-wr9000_firmware 2.4.9
b-link bl-wr9000 *
b-link bl-ac1900_firmware 1.0.2
b-link bl-ac1900 *
b-link bl-ac2100_az3_firmware 1.0.4
b-link bl-ac2100_az3 *
b-link bl-x10_ac8_firmware 1.0.5
b-link bl-x10_ac8 *
b-link bl-lte300_firmware 1.2.3
b-link bl-lte300 *
b-link bl-f1200_at1_firmware 1.0.0
b-link bl-f1200_at1 *
b-link bl-x26_ac8_firmware 1.2.8
b-link bl-x26_ac8 *
b-link blac450m_ae4_firmware 4.0.0
b-link blac450m_ae4 *
b-link bl-x26_da3_firmware 1.2.7
b-link bl-x26_da3 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a command injection flaw found in certain Blink routers. It occurs via the 'cmd' parameter in the bs_SetCmd function, allowing attackers to inject and execute unauthorized commands on the device. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute unauthorized commands on the affected router, potentially compromising the device's security and control, which may lead to unauthorized access, data breaches, or disruption of network services. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for the use of the "LB-LINK_cmd" command, which is exploited for unauthorized command injection. Network or system administrators can look for unusual or unauthorized invocations of this command in device logs or network traffic. Specific commands to detect this might include searching logs for "LB-LINK_cmd" usage or capturing network packets that contain this command to identify potential exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable devices, especially limiting access to the interface that accepts the "LB-LINK_cmd" command. Applying any available firmware updates or patches from the vendor that address this command injection vulnerability is critical. Additionally, monitoring and blocking unauthorized use of the "LB-LINK_cmd" command can help prevent exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart