Skip to main content

CVE-2025-45985: n/a

Critical
VulnerabilityCVE-2025-45985cvecve-2025-45985
Published: Fri Jun 13 2025 (06/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain a command injection vulnerability via the bs_SetSSIDHide function.

AI-Powered Analysis

AILast updated: 06/13/2025, 11:50:38 UTC

Technical Analysis

CVE-2025-45985 is a command injection vulnerability identified in multiple models of Blink routers, including BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0, and BL-X26_DA3 v1.2.7. The vulnerability arises from the bs_SetSSIDHide function, which is responsible for managing the visibility of the router's SSID broadcast. Command injection vulnerabilities allow an attacker to execute arbitrary commands on the underlying operating system with the privileges of the affected service, typically root or administrative level in embedded devices like routers. This can lead to full compromise of the device. The vulnerability does not have a CVSS score assigned yet, and no known exploits have been reported in the wild as of the publication date (June 13, 2025). However, the presence of a command injection vector in a network device is critical because routers serve as the first line of defense and network traffic control points. Exploitation could allow attackers to manipulate network traffic, intercept sensitive data, pivot to internal networks, or deploy persistent malware. The lack of patch links suggests that no official fixes have been released at the time of reporting, increasing the urgency for mitigation. The affected models cover a range of router types, including LTE and Wi-Fi 6 capable devices, indicating a broad attack surface across consumer and potentially small business environments. The vulnerability likely requires network access to the router's management interface or an exposed service that processes the bs_SetSSIDHide function input, but the exact authentication or user interaction requirements are not specified in the available data.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for small and medium enterprises (SMEs) and residential users relying on Blink routers for internet connectivity. Successful exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept confidential communications, disrupt network availability, or launch further attacks within the corporate network. Given the routers' role in managing SSID visibility, attackers might also manipulate wireless network configurations to facilitate unauthorized access or evade detection. The compromise of LTE-capable routers (e.g., BL-LTE300) could additionally affect mobile broadband connectivity, which is critical for remote or mobile workforce scenarios common in Europe. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability details become public. The potential for lateral movement and data exfiltration from compromised routers poses a risk to confidentiality and integrity of organizational data. Moreover, disruption of network availability could impact business operations, especially for organizations with limited IT infrastructure redundancy.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected Blink routers from critical internal networks to limit potential lateral movement if compromised. 2. Restrict management interface access: Limit router management interfaces to trusted IP addresses and disable remote management if not required. 3. Monitor network traffic for anomalies: Deploy network intrusion detection systems (NIDS) to detect unusual command execution patterns or unexpected outbound connections originating from routers. 4. Firmware verification and update: Regularly check Blink's official channels for firmware updates addressing CVE-2025-45985 and apply patches promptly once available. 5. Disable unnecessary services: If possible, disable or restrict the functionality related to SSID hiding or the bs_SetSSIDHide function to reduce attack surface. 6. Implement strong authentication: Enforce strong passwords and, if supported, multi-factor authentication for router management access. 7. Conduct internal audits: Review router configurations and logs for signs of exploitation or unauthorized changes. 8. Vendor engagement: Engage with Blink support or distributors to obtain timelines for patches and request mitigation guidance specific to affected models. These steps go beyond generic advice by focusing on network architecture adjustments, active monitoring, and vendor interaction tailored to the specific vulnerability and device models.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684c0cc0a8c9212743806650

Added to database: 6/13/2025, 11:34:24 AM

Last enriched: 6/13/2025, 11:50:38 AM

Last updated: 8/1/2025, 9:47:50 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats