CVE-2025-7573
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-14

Last updated on: 2025-07-15

Assigner: VulDB

Description
A vulnerability, which was classified as critical, has been found in LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702. This issue affects the function bs_GetManPwd in the library libblinkapi.so of the file /cgi-bin/lighttpd.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-14
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
lb-link bl-ac2100_az3 *
lb-link bl-ac3600 *
lb-link bl-wr9000 *
lb-link bl-ax5400p *
lb-link bl-ac1900 *
lb-link bl-ax1800 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in multiple LB-LINK router models in the function bs_GetManPwd within the libblinkapi.so library, part of the /cgi-bin/lighttpd.cgi file. When exploited, it returns the administrator's username and password in plaintext directly to the client without any authentication checks. This allows unauthorized remote attackers to retrieve sensitive login credentials easily, leading to information disclosure. [1, 2]


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized remote attackers obtaining the administrator's username and password in plaintext, compromising the confidentiality of the affected devices. This can allow attackers to gain unauthorized access to the router, potentially leading to further network compromise or misuse of the device. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a request to the /cgi-bin/lighttpd.cgi endpoint with the getmanpwd parameter and checking if the administrator's username and password are returned in plaintext without authentication. A simple detection command using curl would be: curl http://<router-ip>/cgi-bin/lighttpd.cgi?getmanpwd. If the response contains sensitive credentials in plaintext, the device is vulnerable. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying restrictive firewall rules to block unauthorized remote access to the affected devices, especially blocking access to the /cgi-bin/lighttpd.cgi endpoint. Since no vendor patch or response is available, preventing remote access to the vulnerable function is critical. Monitoring for exploit attempts and isolating affected devices from untrusted networks are also recommended. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart