CVE-2025-57685: n/a
The LB-Link routers, including the BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3 models, are vulnerable to unauthorized command injection. Attackers can exploit this vulnerability by accessing the /goform/set_serial_cfg interface to gain the highest level of device privileges without authorization, enabling them to remotely execute malicious commands.
AI Analysis
Technical Summary
CVE-2025-57685 is a critical security vulnerability affecting multiple models of LB-Link routers, including BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3. The vulnerability arises from an unauthorized command injection flaw accessible via the /goform/set_serial_cfg interface. This interface allows attackers to execute arbitrary commands on the device without any authentication, effectively granting them the highest privilege level on the router. Exploitation of this vulnerability enables remote attackers to take full control of the device, potentially allowing them to manipulate network traffic, install persistent malware, disrupt network availability, or pivot to other internal systems. The lack of authentication and the ability to execute commands remotely make this vulnerability particularly severe. Although no CVSS score has been assigned yet and no known exploits are reported in the wild, the technical details indicate a high risk due to the direct command injection vector and privilege escalation. The affected devices are widely used consumer and small business routers, which often serve as the primary gateway to internal networks, increasing the potential impact of compromise.
Potential Impact
For European organizations, the exploitation of CVE-2025-57685 could have significant consequences. Many small and medium enterprises (SMEs) and home offices rely on LB-Link routers for internet connectivity. A compromised router could lead to interception and manipulation of sensitive data, unauthorized access to internal networks, and disruption of business operations. Given the routers' role as network gateways, attackers could establish persistent footholds, conduct man-in-the-middle attacks, or launch further attacks against corporate resources. The impact extends to confidentiality, integrity, and availability of network communications. Additionally, critical infrastructure or public sector organizations using these devices could face operational disruptions or data breaches. The absence of authentication in the vulnerable interface increases the likelihood of automated exploitation attempts, raising the risk of widespread attacks if patches or mitigations are not promptly applied.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should immediately identify if they are using any of the vulnerable LB-Link router models and firmware versions. Since no official patches or updates are currently linked, organizations should: 1) Restrict access to the router's management interfaces by limiting them to trusted internal networks and disabling remote management where possible. 2) Implement network segmentation to isolate vulnerable devices from critical systems. 3) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected commands or configuration changes. 4) Consider replacing vulnerable devices with routers from vendors that provide timely security updates and have robust security features. 5) Regularly check LB-Link’s official channels for firmware updates addressing this vulnerability and apply them promptly once available. 6) Employ intrusion detection/prevention systems (IDS/IPS) that can detect command injection patterns or anomalous HTTP requests targeting the /goform/set_serial_cfg endpoint. 7) Educate users and administrators about the risks of unauthorized access and the importance of securing network devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-57685: n/a
Description
The LB-Link routers, including the BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3 models, are vulnerable to unauthorized command injection. Attackers can exploit this vulnerability by accessing the /goform/set_serial_cfg interface to gain the highest level of device privileges without authorization, enabling them to remotely execute malicious commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-57685 is a critical security vulnerability affecting multiple models of LB-Link routers, including BL-AC2100_AZ3 V1.0.4, BL-WR4000 v2.5.0, BL-WR9000_AE4 v2.4.9, BL-AC1900_AZ2 v1.0.2, BL-X26_AC8 v1.2.8, and BL-LTE300_DA4 V1.2.3. The vulnerability arises from an unauthorized command injection flaw accessible via the /goform/set_serial_cfg interface. This interface allows attackers to execute arbitrary commands on the device without any authentication, effectively granting them the highest privilege level on the router. Exploitation of this vulnerability enables remote attackers to take full control of the device, potentially allowing them to manipulate network traffic, install persistent malware, disrupt network availability, or pivot to other internal systems. The lack of authentication and the ability to execute commands remotely make this vulnerability particularly severe. Although no CVSS score has been assigned yet and no known exploits are reported in the wild, the technical details indicate a high risk due to the direct command injection vector and privilege escalation. The affected devices are widely used consumer and small business routers, which often serve as the primary gateway to internal networks, increasing the potential impact of compromise.
Potential Impact
For European organizations, the exploitation of CVE-2025-57685 could have significant consequences. Many small and medium enterprises (SMEs) and home offices rely on LB-Link routers for internet connectivity. A compromised router could lead to interception and manipulation of sensitive data, unauthorized access to internal networks, and disruption of business operations. Given the routers' role as network gateways, attackers could establish persistent footholds, conduct man-in-the-middle attacks, or launch further attacks against corporate resources. The impact extends to confidentiality, integrity, and availability of network communications. Additionally, critical infrastructure or public sector organizations using these devices could face operational disruptions or data breaches. The absence of authentication in the vulnerable interface increases the likelihood of automated exploitation attempts, raising the risk of widespread attacks if patches or mitigations are not promptly applied.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should immediately identify if they are using any of the vulnerable LB-Link router models and firmware versions. Since no official patches or updates are currently linked, organizations should: 1) Restrict access to the router's management interfaces by limiting them to trusted internal networks and disabling remote management where possible. 2) Implement network segmentation to isolate vulnerable devices from critical systems. 3) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected commands or configuration changes. 4) Consider replacing vulnerable devices with routers from vendors that provide timely security updates and have robust security features. 5) Regularly check LB-Link’s official channels for firmware updates addressing this vulnerability and apply them promptly once available. 6) Employ intrusion detection/prevention systems (IDS/IPS) that can detect command injection patterns or anomalous HTTP requests targeting the /goform/set_serial_cfg endpoint. 7) Educate users and administrators about the risks of unauthorized access and the importance of securing network devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d197d605d26ef41525088c
Added to database: 9/22/2025, 6:39:18 PM
Last enriched: 9/22/2025, 6:56:29 PM
Last updated: 10/7/2025, 1:41:01 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.