CVE-2025-7564
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-14

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability, which was classified as critical, has been found in LB-LINK BL-AC3600 1.0.22. Affected by this issue is some unknown functionality of the file /etc/shadow. The manipulation with the input root:blinkadmin leads to hard-coded credentials. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-14
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
lb-link bl-ac3600_firmware to 1.0.22 (inc)
lb-link bl-ac3600 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-259 The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the LB-LINK BL-AC3600 router version 1.0.22 and involves hard-coded credentials stored in the /etc/shadow file. Specifically, manipulation with the input 'root:blinkadmin' leads to the presence of these hard-coded credentials, which are easily guessable. This allows unauthorized users with local access to potentially gain access to the device. The vulnerability is classified under CWE-798, indicating the use of hard-coded passwords, and a proof-of-concept exploit is publicly available. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized local users to gain access to the affected router due to hard-coded, easily guessable credentials. This compromises the confidentiality, integrity, and availability of the device, potentially leading to unauthorized control, data breaches, or disruption of network services. Since exploitation requires local access, attackers with physical or local network access could exploit this vulnerability. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the /etc/shadow file on the affected LB-LINK BL-AC3600 device for the presence of the hardcoded credentials related to the input "root:blinkadmin". Since local access is required, you can use commands like `cat /etc/shadow | grep blinkadmin` to identify the hardcoded password entry. Additionally, monitoring for unauthorized access attempts or brute force attempts targeting the root account may help detect exploitation attempts. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting local access to the affected device to trusted personnel only, as exploitation requires local access. Since no vendor patch or countermeasure is available, it is recommended to replace the affected LB-LINK BL-AC3600 device with an alternative product. Monitoring for suspicious activity and changing any exposed credentials where possible may also help reduce risk. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart