CVE-2025-7574: Improper Authentication in LB-LINK BL-AC1900
A vulnerability, which was classified as critical, was found in LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702. Affected is the function reboot/restore of the file /cgi-bin/lighttpd.cgi of the component Web Interface. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7574 is a critical security vulnerability affecting multiple LB-LINK router models, including BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P, and BL-WR9000, specifically versions up to 20250702. The vulnerability resides in the web interface component, particularly in the /cgi-bin/lighttpd.cgi file's reboot/restore function. This flaw allows an attacker to bypass authentication mechanisms, enabling remote exploitation without any user interaction or prior authentication. The improper authentication weakness means that an attacker can remotely trigger reboot or restore operations on the affected devices, potentially disrupting network availability or resetting configurations to default states. The vulnerability has been publicly disclosed, and although no known exploits have been observed in the wild yet, the public availability of exploit details increases the risk of imminent attacks. The vendor, LB-LINK, has not responded to early notifications, and no patches or mitigations have been officially released as of the publication date. The CVSS v4.0 base score is 9.3 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, ease of exploitation (no authentication or user interaction required), and the potential for widespread disruption. The vulnerability's exploitation could lead to unauthorized control over device reboot and restore functions, causing denial of service or enabling further attacks through device misconfiguration or exposure of sensitive information during resets.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises, ISPs, and critical infrastructure operators relying on LB-LINK routers for network connectivity. Successful exploitation can lead to denial of service by forcing device reboots or restoring factory settings, disrupting business operations and communications. This is particularly critical for organizations with remote or distributed networks where physical access to devices is limited. Additionally, unauthorized resets could expose networks to further compromise if default credentials are restored or security configurations are lost. The lack of vendor response and patch availability exacerbates the risk, leaving organizations exposed. Given the criticality and ease of exploitation, attackers could leverage this vulnerability to conduct targeted attacks, disrupt services, or establish footholds in networks. The impact extends to confidentiality, as improper resets might expose sensitive configuration data, and integrity, as unauthorized changes to device state can undermine trust in network infrastructure.
Mitigation Recommendations
European organizations using affected LB-LINK devices should immediately implement compensating controls to mitigate risk. These include isolating vulnerable devices from untrusted networks by restricting access to the web interface via firewall rules or network segmentation. Disabling remote management features on affected routers can reduce exposure. Monitoring network traffic for unusual reboot or restore commands targeting /cgi-bin/lighttpd.cgi may help detect exploitation attempts. Organizations should also consider replacing vulnerable devices with models from vendors with active security support if patches remain unavailable. Regular backups of device configurations are essential to enable rapid recovery in case of forced resets. Additionally, organizations should engage with LB-LINK support channels to seek updates or advisories and stay informed about potential patches. Implementing intrusion detection systems tuned to detect exploitation patterns related to this vulnerability can provide early warning. Finally, educating IT staff about this vulnerability and its indicators is critical for timely response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7574: Improper Authentication in LB-LINK BL-AC1900
Description
A vulnerability, which was classified as critical, was found in LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702. Affected is the function reboot/restore of the file /cgi-bin/lighttpd.cgi of the component Web Interface. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7574 is a critical security vulnerability affecting multiple LB-LINK router models, including BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P, and BL-WR9000, specifically versions up to 20250702. The vulnerability resides in the web interface component, particularly in the /cgi-bin/lighttpd.cgi file's reboot/restore function. This flaw allows an attacker to bypass authentication mechanisms, enabling remote exploitation without any user interaction or prior authentication. The improper authentication weakness means that an attacker can remotely trigger reboot or restore operations on the affected devices, potentially disrupting network availability or resetting configurations to default states. The vulnerability has been publicly disclosed, and although no known exploits have been observed in the wild yet, the public availability of exploit details increases the risk of imminent attacks. The vendor, LB-LINK, has not responded to early notifications, and no patches or mitigations have been officially released as of the publication date. The CVSS v4.0 base score is 9.3 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, ease of exploitation (no authentication or user interaction required), and the potential for widespread disruption. The vulnerability's exploitation could lead to unauthorized control over device reboot and restore functions, causing denial of service or enabling further attacks through device misconfiguration or exposure of sensitive information during resets.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises, ISPs, and critical infrastructure operators relying on LB-LINK routers for network connectivity. Successful exploitation can lead to denial of service by forcing device reboots or restoring factory settings, disrupting business operations and communications. This is particularly critical for organizations with remote or distributed networks where physical access to devices is limited. Additionally, unauthorized resets could expose networks to further compromise if default credentials are restored or security configurations are lost. The lack of vendor response and patch availability exacerbates the risk, leaving organizations exposed. Given the criticality and ease of exploitation, attackers could leverage this vulnerability to conduct targeted attacks, disrupt services, or establish footholds in networks. The impact extends to confidentiality, as improper resets might expose sensitive configuration data, and integrity, as unauthorized changes to device state can undermine trust in network infrastructure.
Mitigation Recommendations
European organizations using affected LB-LINK devices should immediately implement compensating controls to mitigate risk. These include isolating vulnerable devices from untrusted networks by restricting access to the web interface via firewall rules or network segmentation. Disabling remote management features on affected routers can reduce exposure. Monitoring network traffic for unusual reboot or restore commands targeting /cgi-bin/lighttpd.cgi may help detect exploitation attempts. Organizations should also consider replacing vulnerable devices with models from vendors with active security support if patches remain unavailable. Regular backups of device configurations are essential to enable rapid recovery in case of forced resets. Additionally, organizations should engage with LB-LINK support channels to seek updates or advisories and stay informed about potential patches. Implementing intrusion detection systems tuned to detect exploitation patterns related to this vulnerability can provide early warning. Finally, educating IT staff about this vulnerability and its indicators is critical for timely response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-13T07:16:48.181Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68749293a83201eaacc21077
Added to database: 7/14/2025, 5:16:03 AM
Last enriched: 7/14/2025, 5:31:10 AM
Last updated: 7/14/2025, 8:32:41 PM
Views: 11
Related Threats
CVE-2025-53891: CWE-434: Unrestricted Upload of File with Dangerous Type in TimeLineOfficial Time-Line-
MediumCVE-2025-53835: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xwiki xwiki-rendering
CriticalCVE-2025-53833: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in saleem-hadad larecipe
CriticalCVE-2025-53823: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-53822: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.