CVE-2023-26801: n/a in n/a
LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg.
AI Analysis
Technical Summary
CVE-2023-26801 is a critical command injection vulnerability affecting multiple LB-LINK router models, specifically the BL-AC1900_2.0 v1.0.1, BL-WR9000 v2.4.9, BL-X26 v1.2.5, and BL-LTE300 v1.0.8. The vulnerability resides in the /goform/set_LimitClient_cfg endpoint, where the mac, time1, and time2 parameters are improperly sanitized, allowing an attacker to inject arbitrary commands. This flaw is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that user-supplied input is executed directly by the system shell without adequate validation or escaping. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Successful exploitation could allow an attacker to execute arbitrary system commands on the affected device, potentially leading to full device compromise, unauthorized network access, interception or manipulation of network traffic, and pivoting to internal networks. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this vulnerability a significant threat to organizations using these LB-LINK devices. The lack of available patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on LB-LINK routers in their network infrastructure. Compromise of these devices could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the critical nature of the vulnerability and the absence of required authentication, attackers can remotely exploit these devices from anywhere, increasing the attack surface. This is particularly concerning for small and medium enterprises or branch offices that may use these consumer or SMB-grade routers without robust network segmentation or monitoring. The impact extends to confidentiality breaches, integrity violations through manipulation of network traffic or device configurations, and availability disruptions via denial-of-service or device takeover. Additionally, compromised routers could be used as footholds for launching further attacks against European organizations or as part of botnets. The vulnerability's exploitation could also affect critical infrastructure sectors if these devices are deployed in such environments, amplifying the potential consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Isolate affected LB-LINK devices from critical network segments and restrict administrative access to trusted management networks only. 2) Employ network-level filtering to block access to the vulnerable /goform/set_LimitClient_cfg endpoint from untrusted sources, using firewall rules or intrusion prevention systems. 3) Monitor network traffic for unusual or suspicious requests targeting the vulnerable parameters (mac, time1, time2) and implement anomaly detection to identify potential exploitation attempts. 4) Where possible, replace affected LB-LINK routers with devices from vendors with timely security update practices or deploy additional security layers such as VPNs and network segmentation to limit exposure. 5) Conduct regular audits of router configurations and logs to detect unauthorized changes or signs of compromise. 6) Educate IT staff about this vulnerability and encourage vigilance for related indicators of compromise. 7) Stay informed about vendor updates or patches and apply them promptly once available. 8) Consider deploying web application firewalls or reverse proxies that can sanitize or block malicious payloads targeting the vulnerable parameters.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2023-26801: n/a in n/a
Description
LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg.
AI-Powered Analysis
Technical Analysis
CVE-2023-26801 is a critical command injection vulnerability affecting multiple LB-LINK router models, specifically the BL-AC1900_2.0 v1.0.1, BL-WR9000 v2.4.9, BL-X26 v1.2.5, and BL-LTE300 v1.0.8. The vulnerability resides in the /goform/set_LimitClient_cfg endpoint, where the mac, time1, and time2 parameters are improperly sanitized, allowing an attacker to inject arbitrary commands. This flaw is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that user-supplied input is executed directly by the system shell without adequate validation or escaping. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Successful exploitation could allow an attacker to execute arbitrary system commands on the affected device, potentially leading to full device compromise, unauthorized network access, interception or manipulation of network traffic, and pivoting to internal networks. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this vulnerability a significant threat to organizations using these LB-LINK devices. The lack of available patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on LB-LINK routers in their network infrastructure. Compromise of these devices could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the critical nature of the vulnerability and the absence of required authentication, attackers can remotely exploit these devices from anywhere, increasing the attack surface. This is particularly concerning for small and medium enterprises or branch offices that may use these consumer or SMB-grade routers without robust network segmentation or monitoring. The impact extends to confidentiality breaches, integrity violations through manipulation of network traffic or device configurations, and availability disruptions via denial-of-service or device takeover. Additionally, compromised routers could be used as footholds for launching further attacks against European organizations or as part of botnets. The vulnerability's exploitation could also affect critical infrastructure sectors if these devices are deployed in such environments, amplifying the potential consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Isolate affected LB-LINK devices from critical network segments and restrict administrative access to trusted management networks only. 2) Employ network-level filtering to block access to the vulnerable /goform/set_LimitClient_cfg endpoint from untrusted sources, using firewall rules or intrusion prevention systems. 3) Monitor network traffic for unusual or suspicious requests targeting the vulnerable parameters (mac, time1, time2) and implement anomaly detection to identify potential exploitation attempts. 4) Where possible, replace affected LB-LINK routers with devices from vendors with timely security update practices or deploy additional security layers such as VPNs and network segmentation to limit exposure. 5) Conduct regular audits of router configurations and logs to detect unauthorized changes or signs of compromise. 6) Educate IT staff about this vulnerability and encourage vigilance for related indicators of compromise. 7) Stay informed about vendor updates or patches and apply them promptly once available. 8) Consider deploying web application firewalls or reverse proxies that can sanitize or block malicious payloads targeting the vulnerable parameters.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-02-27T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc51b
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 12:40:25 PM
Last updated: 7/25/2025, 4:17:12 PM
Views: 10
Related Threats
CVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumCVE-2025-8836: Reachable Assertion in JasPer
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.