Overview
Discovered in a collection of Blink routers, the CVE-2025-45984 vulnerability is a command injection flaw that can be exploited via the routepwd parameter in a particular function. This vulnerability exposes several models of the routers, putting countless devices and networks at risk. With a CVSS Severity Score of 9.8, this vulnerability is classified as a critical threat. If not addressed promptly, this could lead to severe consequences, including potential system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-45984
Severity: Critical (CVSS: 9.8)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
BL-WR9000 | V2.4.9
BL-AC1900 | V1.0.2
BL-AC2100_AZ3 | V1.0.4
BL-X10_AC8 | V1.0.5
BL-LTE300 | V1.2.3
BL-F1200_AT1 | V1.0.0
BL-X26_AC8 | V1.2.8
BLAC450M_AE4 | V4.0.0
BL-X26_DA3 | V1.2.7
How the Exploit Works
The exploit leverages a command injection vulnerability present in the sub_45B238 function of the affected Blink routers. The attacker can inject commands into the routepwd parameter of this function, which the system will then execute. This can lead to unauthorized access to the system, allowing the attacker to execute arbitrary commands, potentially compromising the system or leaking sensitive data.
Conceptual Example Code
This conceptual example shows how an HTTP request containing a malicious payload could exploit this vulnerability:
POST /sub_45B238 HTTP/1.1
Host: target-router
Content-Type: application/x-www-form-urlencoded
routepwd=;{malicious_command}
In this example, `{malicious_command}` is a placeholder for the actual command that an attacker wants the system to execute.
Mitigation and Prevention
To mitigate this vulnerability, users are advised to apply the vendor patch promptly. Until the patch can be applied, users can use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to detect and prevent exploitation of this vulnerability. Regularly updating and patching systems, along with monitoring network activity for any unusual patterns, can also help prevent such vulnerabilities from being exploited.