CVE-2025-7572: Information Disclosure in LB-LINK BL-AC1900
A vulnerability classified as critical was found in LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702. This vulnerability affects the function bs_GetHostInfo in the library libblinkapi.so of the file /cgi-bin/lighttpd.cgi. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7572 is a critical information disclosure vulnerability affecting multiple LB-LINK router models, including BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P, and BL-WR9000, specifically in firmware versions up to 20250702. The vulnerability resides in the function bs_GetHostInfo within the shared library libblinkapi.so, which is invoked via the /cgi-bin/lighttpd.cgi endpoint. An attacker can remotely exploit this flaw without requiring authentication or user interaction, leveraging the network-accessible CGI interface to manipulate the function and extract sensitive information from the device. The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates that the attack is network-based, requires low attack complexity, no privileges, no user interaction, and results in low-impact confidentiality loss. The vendor has been contacted but has not responded or issued a patch, and no official fixes or mitigations have been published. While no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could allow attackers to gather sensitive host information, potentially facilitating further attacks such as targeted exploits or network reconnaissance.
Potential Impact
For European organizations, especially those relying on LB-LINK routers in their network infrastructure, this vulnerability poses a significant risk of unauthorized information disclosure. The leaked host information could include configuration details, network topology, or other sensitive data that attackers can use to escalate attacks or bypass security controls. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators who may use these devices at network edges or in branch offices. The lack of vendor response and patch availability increases exposure time, making timely mitigation challenging. Additionally, the remote and unauthenticated nature of the exploit means that attackers can target vulnerable devices over the internet or internal networks without needing credentials, increasing the attack surface. While the CVSS score is medium, the potential for reconnaissance and subsequent attacks elevates the operational risk, especially in environments with limited network segmentation or monitoring.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately identify and inventory all LB-LINK devices running affected firmware versions using network scanning and asset management tools. 2) Restrict access to the /cgi-bin/lighttpd.cgi interface by implementing firewall rules or access control lists (ACLs) to limit exposure to trusted management networks only, blocking external internet access where possible. 3) Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4) Monitor network traffic for unusual requests targeting the /cgi-bin/lighttpd.cgi endpoint or abnormal information disclosure patterns. 5) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom signatures to detect and block exploit attempts against this CGI interface. 6) Engage with LB-LINK support channels persistently to demand a security update or official guidance. 7) As a longer-term measure, evaluate replacing affected devices with alternatives from vendors with active security support and patching practices. 8) Educate IT staff about this vulnerability to ensure rapid response to any suspicious activity related to these devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-7572: Information Disclosure in LB-LINK BL-AC1900
Description
A vulnerability classified as critical was found in LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702. This vulnerability affects the function bs_GetHostInfo in the library libblinkapi.so of the file /cgi-bin/lighttpd.cgi. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7572 is a critical information disclosure vulnerability affecting multiple LB-LINK router models, including BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P, and BL-WR9000, specifically in firmware versions up to 20250702. The vulnerability resides in the function bs_GetHostInfo within the shared library libblinkapi.so, which is invoked via the /cgi-bin/lighttpd.cgi endpoint. An attacker can remotely exploit this flaw without requiring authentication or user interaction, leveraging the network-accessible CGI interface to manipulate the function and extract sensitive information from the device. The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates that the attack is network-based, requires low attack complexity, no privileges, no user interaction, and results in low-impact confidentiality loss. The vendor has been contacted but has not responded or issued a patch, and no official fixes or mitigations have been published. While no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could allow attackers to gather sensitive host information, potentially facilitating further attacks such as targeted exploits or network reconnaissance.
Potential Impact
For European organizations, especially those relying on LB-LINK routers in their network infrastructure, this vulnerability poses a significant risk of unauthorized information disclosure. The leaked host information could include configuration details, network topology, or other sensitive data that attackers can use to escalate attacks or bypass security controls. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators who may use these devices at network edges or in branch offices. The lack of vendor response and patch availability increases exposure time, making timely mitigation challenging. Additionally, the remote and unauthenticated nature of the exploit means that attackers can target vulnerable devices over the internet or internal networks without needing credentials, increasing the attack surface. While the CVSS score is medium, the potential for reconnaissance and subsequent attacks elevates the operational risk, especially in environments with limited network segmentation or monitoring.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately identify and inventory all LB-LINK devices running affected firmware versions using network scanning and asset management tools. 2) Restrict access to the /cgi-bin/lighttpd.cgi interface by implementing firewall rules or access control lists (ACLs) to limit exposure to trusted management networks only, blocking external internet access where possible. 3) Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4) Monitor network traffic for unusual requests targeting the /cgi-bin/lighttpd.cgi endpoint or abnormal information disclosure patterns. 5) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom signatures to detect and block exploit attempts against this CGI interface. 6) Engage with LB-LINK support channels persistently to demand a security update or official guidance. 7) As a longer-term measure, evaluate replacing affected devices with alternatives from vendors with active security support and patching practices. 8) Educate IT staff about this vulnerability to ensure rapid response to any suspicious activity related to these devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-13T07:16:43.264Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68748f0fa83201eaacc1f7e4
Added to database: 7/14/2025, 5:01:03 AM
Last enriched: 7/14/2025, 5:16:31 AM
Last updated: 7/16/2025, 9:51:38 AM
Views: 7
Related Threats
CVE-2025-54051: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bPlugins LightBox Block
MediumCVE-2025-54050: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CyberChimps Responsive Addons for Elementor
MediumCVE-2025-54047: CWE-862 Missing Authorization in QuanticaLabs Cost Calculator
MediumCVE-2025-54043: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in YayCommerce SMTP for Amazon SES
HighCVE-2025-54042: CWE-352 Cross-Site Request Forgery (CSRF) in xfinitysoft WP Post Hide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.