Skip to main content

CVE-2025-7564: Hard-coded Credentials in LB-LINK BL-AC3600

High
VulnerabilityCVE-2025-7564cvecve-2025-7564
Published: Mon Jul 14 2025 (07/14/2025, 02:32:05 UTC)
Source: CVE Database V5
Vendor/Project: LB-LINK
Product: BL-AC3600

Description

A vulnerability, which was classified as critical, has been found in LB-LINK BL-AC3600 1.0.22. Affected by this issue is some unknown functionality of the file /etc/shadow. The manipulation with the input root:blinkadmin leads to hard-coded credentials. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/14/2025, 03:01:08 UTC

Technical Analysis

CVE-2025-7564 is a critical vulnerability identified in the LB-LINK BL-AC3600 wireless router, specifically version 1.0.22. The flaw involves hard-coded credentials embedded within the device's /etc/shadow file, which is responsible for storing hashed user passwords on Unix-like systems. The vulnerability manifests when the input 'root:blinkadmin' is manipulated, effectively granting unauthorized access via these hard-coded credentials. Exploitation requires local access to the device, meaning an attacker must already have some form of physical or network-level access to the router's administrative interface or underlying system. The vulnerability does not require user interaction and can be exploited with low attack complexity. The CVSS 4.0 score is 8.5 (high severity), reflecting the significant impact on confidentiality, integrity, and availability, as the attacker can gain root-level privileges. The vendor LB-LINK has not responded to disclosure attempts, and no patches or mitigations have been publicly released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. This vulnerability poses a serious threat to network security, as an attacker with local access can fully compromise the device, potentially pivoting to internal networks or intercepting sensitive data.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for enterprises and service providers relying on LB-LINK BL-AC3600 routers in their network infrastructure. Successful exploitation could lead to complete device takeover, enabling attackers to intercept, modify, or disrupt network traffic, degrade service availability, and potentially launch further attacks within the internal network. Confidentiality breaches could expose sensitive corporate or customer data. Integrity of network configurations and data could be compromised, and availability could be impacted by malicious changes or denial-of-service conditions. Given the local access requirement, the threat is higher in environments where physical security is lax or where internal threat actors or compromised insiders exist. The lack of vendor response and patches exacerbates the risk, as organizations cannot remediate through official updates, increasing reliance on compensating controls. This vulnerability could also impact managed service providers and ISPs using these devices, potentially affecting multiple downstream customers.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any LB-LINK BL-AC3600 routers running version 1.0.22. Given the absence of an official patch, mitigation should focus on reducing local access to these devices. This includes enforcing strict physical security controls to prevent unauthorized personnel from accessing the hardware. Network segmentation should be applied to isolate management interfaces from general user networks, limiting exposure. Change default credentials and disable any unnecessary local access methods such as SSH or Telnet if possible. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts. Where feasible, replace affected devices with alternative models or vendors that do not have this vulnerability. Additionally, implement strict access control policies and consider deploying network intrusion detection systems to detect lateral movement or unusual administrative actions. Regularly review and update incident response plans to address potential exploitation scenarios involving device compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-12T21:11:53.262Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68746f6ba83201eaacc117fe

Added to database: 7/14/2025, 2:46:03 AM

Last enriched: 7/14/2025, 3:01:08 AM

Last updated: 7/15/2025, 8:32:35 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats