CVE-2025-7564
BaseFortify
Publication date: 2025-07-14
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lb-link | bl-ac3600_firmware | to 1.0.22 (inc) |
| lb-link | bl-ac3600 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-259 | The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components. |
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the LB-LINK BL-AC3600 router version 1.0.22 and involves hard-coded credentials stored in the /etc/shadow file. Specifically, manipulation with the input 'root:blinkadmin' leads to the presence of these hard-coded credentials, which are easily guessable. This allows unauthorized users with local access to potentially gain access to the device. The vulnerability is classified under CWE-798, indicating the use of hard-coded passwords, and a proof-of-concept exploit is publicly available. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized local users to gain access to the affected router due to hard-coded, easily guessable credentials. This compromises the confidentiality, integrity, and availability of the device, potentially leading to unauthorized control, data breaches, or disruption of network services. Since exploitation requires local access, attackers with physical or local network access could exploit this vulnerability. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the /etc/shadow file on the affected LB-LINK BL-AC3600 device for the presence of the hardcoded credentials related to the input "root:blinkadmin". Since local access is required, you can use commands like `cat /etc/shadow | grep blinkadmin` to identify the hardcoded password entry. Additionally, monitoring for unauthorized access attempts or brute force attempts targeting the root account may help detect exploitation attempts. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting local access to the affected device to trusted personnel only, as exploitation requires local access. Since no vendor patch or countermeasure is available, it is recommended to replace the affected LB-LINK BL-AC3600 device with an alternative product. Monitoring for suspicious activity and changing any exposed credentials where possible may also help reduce risk. [2]