CVE-2025-57685: n/a
The LB-Link routers, including the BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3 models, are vulnerable to unauthorized command injection. Attackers can exploit this vulnerability by accessing the /goform/set_serial_cfg interface to gain the highest level of device privileges without authorization, enabling them to remotely execute malicious commands.
AI Analysis
Technical Summary
CVE-2025-57685 is a critical command injection vulnerability identified in several LB-Link router models, including BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3. The flaw resides in the /goform/set_serial_cfg web interface, which improperly sanitizes input parameters, allowing unauthenticated remote attackers to inject arbitrary commands. Exploitation grants attackers the highest privilege level on the device, enabling full control over router functions, including configuration changes, network traffic interception, and potential pivoting to internal networks. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection risks. The CVSS v3.1 score is 8.8 (High), reflecting the vulnerability's ease of remote exploitation without authentication or user interaction and its severe impact on confidentiality, integrity, and availability. Although no public exploits are currently reported, the vulnerability's characteristics suggest it could be weaponized rapidly. The lack of available patches at the time of disclosure increases the urgency for interim mitigations. This vulnerability poses a significant risk to organizations relying on these LB-Link routers, especially in environments where these devices serve as critical network gateways or are exposed to untrusted networks.
Potential Impact
For European organizations, exploitation of CVE-2025-57685 could lead to complete compromise of affected routers, resulting in unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Attackers gaining control over routers can manipulate traffic flows, deploy malware, or establish persistent backdoors, severely impacting operational continuity and data confidentiality. Critical sectors such as finance, healthcare, and government agencies using these routers may face heightened risks of espionage, data breaches, and service outages. The vulnerability's remote and unauthenticated nature increases the attack surface, particularly for organizations with routers exposed to the internet or poorly segmented networks. Additionally, supply chain and managed service providers using these devices could inadvertently propagate risks to multiple clients. The absence of known exploits currently provides a narrow window for proactive defense, but the high severity score indicates that successful exploitation would have widespread and severe consequences.
Mitigation Recommendations
1. Immediately inventory all LB-Link router models within the organization to identify affected devices. 2. Monitor LB-Link vendor communications for official firmware updates addressing CVE-2025-57685 and apply patches promptly upon release. 3. Until patches are available, restrict access to the /goform/set_serial_cfg interface by implementing network-level controls such as firewall rules or access control lists to block external and unauthorized internal access. 4. Employ network segmentation to isolate router management interfaces from general user networks and the internet. 5. Enable logging and continuous monitoring for unusual router behavior or unexpected configuration changes indicative of exploitation attempts. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on LB-Link routers. 7. Educate IT and security teams about the vulnerability specifics to enhance incident response readiness. 8. For managed service providers, communicate with clients about the vulnerability and coordinate mitigation efforts. 9. Review and harden router configurations, disabling unnecessary services and interfaces to reduce attack vectors. 10. Implement multi-factor authentication and strong password policies for router management interfaces where applicable to reduce risk from other attack vectors.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-57685: n/a
Description
The LB-Link routers, including the BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3 models, are vulnerable to unauthorized command injection. Attackers can exploit this vulnerability by accessing the /goform/set_serial_cfg interface to gain the highest level of device privileges without authorization, enabling them to remotely execute malicious commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-57685 is a critical command injection vulnerability identified in several LB-Link router models, including BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3. The flaw resides in the /goform/set_serial_cfg web interface, which improperly sanitizes input parameters, allowing unauthenticated remote attackers to inject arbitrary commands. Exploitation grants attackers the highest privilege level on the device, enabling full control over router functions, including configuration changes, network traffic interception, and potential pivoting to internal networks. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection risks. The CVSS v3.1 score is 8.8 (High), reflecting the vulnerability's ease of remote exploitation without authentication or user interaction and its severe impact on confidentiality, integrity, and availability. Although no public exploits are currently reported, the vulnerability's characteristics suggest it could be weaponized rapidly. The lack of available patches at the time of disclosure increases the urgency for interim mitigations. This vulnerability poses a significant risk to organizations relying on these LB-Link routers, especially in environments where these devices serve as critical network gateways or are exposed to untrusted networks.
Potential Impact
For European organizations, exploitation of CVE-2025-57685 could lead to complete compromise of affected routers, resulting in unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Attackers gaining control over routers can manipulate traffic flows, deploy malware, or establish persistent backdoors, severely impacting operational continuity and data confidentiality. Critical sectors such as finance, healthcare, and government agencies using these routers may face heightened risks of espionage, data breaches, and service outages. The vulnerability's remote and unauthenticated nature increases the attack surface, particularly for organizations with routers exposed to the internet or poorly segmented networks. Additionally, supply chain and managed service providers using these devices could inadvertently propagate risks to multiple clients. The absence of known exploits currently provides a narrow window for proactive defense, but the high severity score indicates that successful exploitation would have widespread and severe consequences.
Mitigation Recommendations
1. Immediately inventory all LB-Link router models within the organization to identify affected devices. 2. Monitor LB-Link vendor communications for official firmware updates addressing CVE-2025-57685 and apply patches promptly upon release. 3. Until patches are available, restrict access to the /goform/set_serial_cfg interface by implementing network-level controls such as firewall rules or access control lists to block external and unauthorized internal access. 4. Employ network segmentation to isolate router management interfaces from general user networks and the internet. 5. Enable logging and continuous monitoring for unusual router behavior or unexpected configuration changes indicative of exploitation attempts. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on LB-Link routers. 7. Educate IT and security teams about the vulnerability specifics to enhance incident response readiness. 8. For managed service providers, communicate with clients about the vulnerability and coordinate mitigation efforts. 9. Review and harden router configurations, disabling unnecessary services and interfaces to reduce attack vectors. 10. Implement multi-factor authentication and strong password policies for router management interfaces where applicable to reduce risk from other attack vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d197d605d26ef41525088c
Added to database: 9/22/2025, 6:39:18 PM
Last enriched: 11/17/2025, 7:29:06 PM
Last updated: 11/21/2025, 12:09:10 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13138: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
HighCVE-2025-12964: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nalam-1 Magical Products Display – Elementor WooCommerce Widgets | Product Sliders, Grids & AJAX Search
MediumCVE-2025-12750: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in trainingbusinesspros Groundhogg — CRM, Newsletters, and Marketing Automation
MediumCVE-2025-12160: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nmedia Simple User Registration
HighCVE-2025-12066: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in etruel WP Delete Post Copies
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.