{"id":53611,"date":"2025-06-19T09:41:45","date_gmt":"2025-06-19T09:41:45","guid":{"rendered":""},"modified":"2025-06-30T23:19:20","modified_gmt":"2025-07-01T05:19:20","slug":"cve-2025-45984-critical-command-injection-vulnerability-detected-in-blink-routers","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-45984-critical-command-injection-vulnerability-detected-in-blink-routers\/","title":{"rendered":"<strong>CVE-2025-45984: Critical Command Injection Vulnerability Detected in Blink Routers<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>Discovered in a collection of Blink routers, the CVE-2025-45984 vulnerability is a command injection flaw that can be exploited via the routepwd parameter in a particular function. This vulnerability exposes several models of the routers, putting countless devices and networks at risk. With a CVSS Severity Score of 9.8, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5609-critical-buffer-overflow-vulnerability-in-tenda-ac18-15-03-05-05\/\"  data-wpil-monitor-id=\"59956\">vulnerability is classified as a critical<\/a> threat. If not addressed promptly, this could lead to severe consequences, including <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-40912-critical-vulnerability-in-cryptx-for-perl-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"60802\">potential system<\/a> compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-45984<br \/>\nSeverity: Critical (CVSS: 9.8)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5978-critical-vulnerability-in-tenda-fh1202-1-2-0-14-potentially-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"61026\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-397417785\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>BL-WR9000 | V2.4.9<br \/>\nBL-AC1900 | V1.0.2<br \/>\nBL-AC2100_AZ3 | V1.0.4<br \/>\nBL-X10_AC8 | V1.0.5<br \/>\nBL-LTE300 | V1.2.3<br \/>\nBL-F1200_AT1 | V1.0.0<br \/>\nBL-X26_AC8 | V1.2.8<br \/>\nBLAC450M_AE4 | V4.0.0<br \/>\nBL-X26_DA3 | V1.2.7<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit leverages a command injection vulnerability present in the sub_45B238 function of the affected <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5853-critical-vulnerability-in-tenda-ac6-router-may-lead-to-system-compromise\/\"  data-wpil-monitor-id=\"60039\">Blink<\/a> routers. The attacker can inject commands into the routepwd parameter of this function, which the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5491-acer-controlcenter-remote-code-execution-vulnerability-potential-system-compromise\/\"  data-wpil-monitor-id=\"61253\">system will then execute<\/a>. This can lead to unauthorized access to the system, allowing the attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2011-10007-arbitrary-code-execution-vulnerability-in-file-find-rule-for-perl\/\"  data-wpil-monitor-id=\"60000\">execute arbitrary<\/a> commands, potentially compromising the system or leaking sensitive data.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1223204332\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>This conceptual example shows how an <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6162-critical-buffer-overflow-vulnerability-in-totolink-ex1200t-http-post-request-handler\/\"  data-wpil-monitor-id=\"62278\">HTTP request containing a malicious payload could exploit this vulnerability:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\">POST \/sub_45B238 HTTP\/1.1\nHost: target-router\nContent-Type: application\/x-www-form-urlencoded\nroutepwd=;{malicious_command}<\/code><\/pre>\n<p>In this example, `{malicious_command}` is a placeholder for the actual <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41661-unauthenticated-remote-command-execution-vulnerability-due-to-csrf-in-main-web-interface\/\"  data-wpil-monitor-id=\"61147\">command that an attacker wants the system to execute<\/a>.<\/p>\n<p><strong>Mitigation and Prevention<\/strong><\/p>\n<p>To <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-39486-rankie-sql-injection-vulnerability-and-mitigation-measures\/\"  data-wpil-monitor-id=\"62522\">mitigate this vulnerability<\/a>, users are advised to apply the vendor patch promptly. Until the patch can be applied, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5485-a-critical-vulnerability-pertaining-to-user-name-enumeration-in-web-management-interfaces\/\"  data-wpil-monitor-id=\"61515\">users can use a Web<\/a> Application Firewall (WAF) or Intrusion Detection System (IDS) to detect and prevent exploitation of this vulnerability. Regularly updating and patching systems, along with monitoring network activity for any unusual patterns, can also help <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49155-uncontrolled-search-path-vulnerability-in-trend-micro-apex-one-data-loss-prevention-module\/\"  data-wpil-monitor-id=\"62521\">prevent such vulnerabilities<\/a> from being exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Discovered in a collection of Blink routers, the CVE-2025-45984 vulnerability is a command injection flaw that can be exploited via the routepwd parameter in a particular function. This vulnerability exposes several models of the routers, putting countless devices and networks at risk. With a CVSS Severity Score of 9.8, this vulnerability is classified as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[78],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-53611","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/53611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=53611"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/53611\/revisions"}],"predecessor-version":[{"id":56194,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/53611\/revisions\/56194"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=53611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=53611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=53611"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=53611"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=53611"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=53611"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=53611"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=53611"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=53611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}