Skip to main content

CVE-2025-45988: n/a

Critical
VulnerabilityCVE-2025-45988cvecve-2025-45988
Published: Fri Jun 13 2025 (06/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.

AI-Powered Analysis

AILast updated: 06/13/2025, 11:49:30 UTC

Technical Analysis

CVE-2025-45988 is a set of multiple command injection vulnerabilities identified in several models of Blink routers, specifically BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0, and BL-X26_DA3 v1.2.7. The vulnerabilities arise from improper sanitization of the 'cmd' parameter within the bs_SetCmd function, which allows an attacker to inject arbitrary commands that the router executes. This type of flaw typically enables remote code execution, potentially allowing an attacker to gain control over the affected device. The vulnerabilities do not require authentication or user interaction, increasing the risk of exploitation. Although no known exploits are currently reported in the wild, the presence of multiple affected models and the nature of the vulnerability suggest a significant risk if exploited. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details imply a high severity due to the potential for full device compromise. The affected routers are commonly used in both consumer and small-to-medium enterprise environments, making the attack surface broad. The exploitation could lead to network compromise, interception or manipulation of traffic, and use of the router as a pivot point for further attacks within an organization’s network.

Potential Impact

For European organizations, the impact of CVE-2025-45988 could be substantial. Compromised routers can lead to loss of confidentiality as attackers may intercept sensitive communications or credentials passing through the device. Integrity can be undermined by attackers altering traffic or injecting malicious payloads into network streams. Availability may also be affected if attackers disrupt router functionality or use the device in denial-of-service attacks. Given that routers are critical network infrastructure components, their compromise can facilitate lateral movement within corporate networks, enabling attackers to access internal systems and data. This is particularly concerning for sectors with high security requirements such as finance, healthcare, and government institutions in Europe. Additionally, the exploitation of these vulnerabilities could enable attackers to create persistent backdoors, making detection and remediation more difficult. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains high due to the ease of exploitation and the critical role of routers in network security.

Mitigation Recommendations

To mitigate CVE-2025-45988, European organizations should take immediate and specific actions beyond generic patching advice. First, identify all affected Blink router models in their environment through asset inventories and network scans. Since no patches are currently linked, organizations should contact Blink or their vendors for official firmware updates or advisories. In the interim, restrict access to router management interfaces by implementing network segmentation and firewall rules that limit administrative access to trusted IP addresses only. Disable remote management features if not required, especially those accessible from the internet. Employ network intrusion detection systems (NIDS) to monitor for unusual command injection patterns or anomalous traffic to and from routers. Regularly audit router configurations for unauthorized changes. Consider deploying network-level protections such as web application firewalls (WAFs) or proxy devices that can filter malicious payloads targeting the 'cmd' parameter. Finally, prepare incident response plans specifically addressing router compromise scenarios, including rapid isolation and replacement of affected devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684c0cc0a8c9212743806659

Added to database: 6/13/2025, 11:34:24 AM

Last enriched: 6/13/2025, 11:49:30 AM

Last updated: 8/2/2025, 2:31:53 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats