Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12387: CWE-754 Improper Check for Unusual or Exceptional Conditions in Pix-Link LV-WR21Q

0
Medium
VulnerabilityCVE-2025-12387cvecve-2025-12387cwe-754
Published: Tue Jan 27 2026 (01/27/2026, 11:57:55 UTC)
Source: CVE Database V5
Vendor/Project: Pix-Link
Product: LV-WR21Q

Description

A vulnerability in the Pix-Link LV-WR21Q router's language module allows remote attackers to trigger a denial of service (DoS) by sending a specially crafted HTTP POST request containing non-existing language parameter. This renders the server unable to serve correct lang.js file, which causes administrator panel to not work, resulting in DoS until the language settings is reverted to a correct value. The Denial of Service affects only the administrator panel and does not affect other router functionalities. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 01/27/2026, 12:20:14 UTC

Technical Analysis

CVE-2025-12387 is a vulnerability classified under CWE-754, indicating an improper check for unusual or exceptional conditions within the Pix-Link LV-WR21Q router's language module. The flaw arises when the router processes HTTP POST requests to the administrator panel containing a language parameter value that does not exist. This malformed request causes the router to fail in serving the lang.js JavaScript file, which is essential for the proper functioning of the admin interface. Consequently, the administrator panel becomes unusable, effectively causing a denial of service (DoS) condition. The vulnerability was confirmed in firmware version V108_108, though other versions have not been tested and may also be vulnerable. Exploitation requires no authentication or user interaction and can be performed remotely over the network, making it accessible to any attacker with network access to the device's admin interface. Despite notification, the vendor has not released patches or detailed information about affected versions. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on availability. The vulnerability impacts only the availability of the admin panel, leaving other router functions operational. This limits the scope of the attack but still poses a risk by denying administrators access to device management capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2025-12387 is the disruption of administrative access to the Pix-Link LV-WR21Q routers. This denial of service on the admin panel can delay or prevent configuration changes, security updates, or incident response actions, potentially increasing exposure to other threats. Although the router's core networking functions remain unaffected, the inability to manage the device can lead to operational challenges, especially in environments where these routers are used for critical connectivity or network segmentation. Organizations relying on centralized or remote management may find recovery slower if the language settings are inadvertently or maliciously changed. The lack of a patch or vendor response increases the risk window. However, since exploitation does not compromise confidentiality or integrity, the direct risk of data breach or device takeover is low. Still, the administrative disruption could be leveraged as part of a broader attack strategy targeting network infrastructure availability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement network-level access controls to restrict access to the router's administrator panel, limiting it to trusted management hosts or VPN connections. Monitoring HTTP POST requests to the admin interface for unusual language parameter values can help detect exploitation attempts. Administrators should document and maintain correct language settings to quickly revert if the admin panel becomes unresponsive. Network segmentation can isolate management interfaces from general user traffic, reducing exposure. Where possible, organizations should consider replacing or upgrading affected devices to models with vendor support and security updates. In the absence of vendor patches, deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to block malformed language parameter requests can provide additional protection. Regular backups of router configurations will facilitate recovery if the admin panel is disabled. Finally, organizations should engage with Pix-Link or authorized resellers to seek firmware updates or official guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-10-28T12:02:33.768Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978aa244623b1157c209818

Added to database: 1/27/2026, 12:05:56 PM

Last enriched: 1/27/2026, 12:20:14 PM

Last updated: 1/28/2026, 2:20:05 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats