Skip to main content

CVE-2023-26801: n/a in n/a

Critical
VulnerabilityCVE-2023-26801cvecve-2023-26801
Published: Sun Mar 26 2023 (03/26/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:40:25 UTC

Technical Analysis

CVE-2023-26801 is a critical command injection vulnerability affecting multiple LB-LINK router models, specifically the BL-AC1900_2.0 v1.0.1, BL-WR9000 v2.4.9, BL-X26 v1.2.5, and BL-LTE300 v1.0.8. The vulnerability resides in the /goform/set_LimitClient_cfg endpoint, where the mac, time1, and time2 parameters are improperly sanitized, allowing an attacker to inject arbitrary commands. This flaw is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that user-supplied input is executed directly by the system shell without adequate validation or escaping. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Successful exploitation could allow an attacker to execute arbitrary system commands on the affected device, potentially leading to full device compromise, unauthorized network access, interception or manipulation of network traffic, and pivoting to internal networks. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this vulnerability a significant threat to organizations using these LB-LINK devices. The lack of available patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those relying on LB-LINK routers in their network infrastructure. Compromise of these devices could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the critical nature of the vulnerability and the absence of required authentication, attackers can remotely exploit these devices from anywhere, increasing the attack surface. This is particularly concerning for small and medium enterprises or branch offices that may use these consumer or SMB-grade routers without robust network segmentation or monitoring. The impact extends to confidentiality breaches, integrity violations through manipulation of network traffic or device configurations, and availability disruptions via denial-of-service or device takeover. Additionally, compromised routers could be used as footholds for launching further attacks against European organizations or as part of botnets. The vulnerability's exploitation could also affect critical infrastructure sectors if these devices are deployed in such environments, amplifying the potential consequences.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Isolate affected LB-LINK devices from critical network segments and restrict administrative access to trusted management networks only. 2) Employ network-level filtering to block access to the vulnerable /goform/set_LimitClient_cfg endpoint from untrusted sources, using firewall rules or intrusion prevention systems. 3) Monitor network traffic for unusual or suspicious requests targeting the vulnerable parameters (mac, time1, time2) and implement anomaly detection to identify potential exploitation attempts. 4) Where possible, replace affected LB-LINK routers with devices from vendors with timely security update practices or deploy additional security layers such as VPNs and network segmentation to limit exposure. 5) Conduct regular audits of router configurations and logs to detect unauthorized changes or signs of compromise. 6) Educate IT staff about this vulnerability and encourage vigilance for related indicators of compromise. 7) Stay informed about vendor updates or patches and apply them promptly once available. 8) Consider deploying web application firewalls or reverse proxies that can sanitize or block malicious payloads targeting the vulnerable parameters.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-02-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc51b

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:40:25 PM

Last updated: 7/25/2025, 4:17:12 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats