Skip to main content

CVE-2025-45984: n/a

Critical
VulnerabilityCVE-2025-45984cvecve-2025-45984
Published: Fri Jun 13 2025 (06/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Blink routers BL-WR9000 V2.4.9, BL-AC1900 V1.0.2, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 V1.0.5, BL-LTE300 V1.2.3, BL-F1200_AT1 V1.0.0, BL-X26_AC8 V1.2.8, BLAC450M_AE4 V4.0.0 and BL-X26_DA3 V1.2.7 were discovered to contain a command injection vulnerability via the routepwd parameter in the sub_45B238 function.

AI-Powered Analysis

AILast updated: 06/13/2025, 11:50:53 UTC

Technical Analysis

CVE-2025-45984 is a command injection vulnerability identified in multiple models of Blink routers, including BL-WR9000 V2.4.9, BL-AC1900 V1.0.2, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 V1.0.5, BL-LTE300 V1.2.3, BL-F1200_AT1 V1.0.0, BL-X26_AC8 V1.2.8, BLAC450M_AE4 V4.0.0, and BL-X26_DA3 V1.2.7. The vulnerability arises from improper input validation of the 'routepwd' parameter within the sub_45B238 function, which allows an attacker to inject arbitrary commands into the router's operating system. Command injection vulnerabilities enable attackers to execute arbitrary system commands with the privileges of the affected application—in this case, the router's firmware. This can lead to full compromise of the device, including unauthorized configuration changes, interception or redirection of network traffic, installation of persistent malware, or pivoting to other devices on the network. The vulnerability does not have an assigned CVSS score yet, and no known exploits have been reported in the wild as of the publication date (June 13, 2025). However, the presence of a command injection vector in network infrastructure devices like routers is inherently critical due to the potential for widespread network disruption and data compromise. The affected Blink router models are commonly used in both residential and small to medium enterprise environments, often serving as the primary gateway to the internet. The lack of available patches or mitigation details in the provided information suggests that affected organizations must proactively implement protective measures. Given the nature of the vulnerability, exploitation likely requires network access to the router's management interface, which may or may not be exposed externally depending on the configuration. No authentication or user interaction requirements are explicitly stated, but command injection vulnerabilities in routers often can be exploited without authentication if the management interface is exposed or if other vulnerabilities allow bypassing authentication controls.

Potential Impact

For European organizations, exploitation of this vulnerability could have significant consequences. Compromise of routers can lead to interception and manipulation of sensitive data, disruption of business operations through denial of service or network misconfiguration, and establishment of persistent footholds for further attacks within corporate networks. Critical infrastructure sectors, including finance, healthcare, and government, often rely on secure and stable network infrastructure; a compromised router could undermine the confidentiality, integrity, and availability of their systems. Additionally, small and medium enterprises (SMEs), which may use these Blink router models due to cost considerations, could be disproportionately affected due to limited cybersecurity resources. The ability to execute arbitrary commands on routers can facilitate lateral movement, data exfiltration, and deployment of ransomware or other malware. Given the routers' role as network gateways, the impact extends beyond individual devices to the broader network environment. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid development of exploit code. European organizations should therefore treat this vulnerability as a high-risk issue requiring prompt attention.

Mitigation Recommendations

1. Immediate Network Segmentation: Isolate affected Blink routers from critical network segments and restrict management interface access to trusted administrative networks only. 2. Disable Remote Management: If remote management interfaces (e.g., WAN-side access, UPnP) are enabled on these routers, disable them to reduce exposure. 3. Access Control Enforcement: Implement strict firewall rules to limit access to router management ports (e.g., HTTP/HTTPS, SSH) to authorized IP addresses only. 4. Monitor Network Traffic: Deploy network intrusion detection systems (NIDS) to detect anomalous command injection attempts or unusual router behavior. 5. Vendor Engagement: Engage with Blink or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. Firmware Integrity Verification: Regularly verify the integrity of router firmware to detect unauthorized modifications. 7. Incident Response Preparedness: Develop and test incident response plans specific to network infrastructure compromise scenarios. 8. Alternative Hardware Consideration: Evaluate the feasibility of replacing vulnerable Blink router models with devices from vendors with stronger security track records if patches are delayed. 9. User Awareness: Educate network administrators about the risks of exposing router management interfaces and the importance of secure configuration. These measures go beyond generic advice by focusing on network architecture adjustments, proactive monitoring, and vendor coordination tailored to the specific vulnerability and affected devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684c0cc0a8c921274380664d

Added to database: 6/13/2025, 11:34:24 AM

Last enriched: 6/13/2025, 11:50:53 AM

Last updated: 7/31/2025, 8:11:45 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats