CVE-2025-45984
📋 TL;DR
This CVE describes a command injection vulnerability in multiple Blink router models via the routepwd parameter. Attackers can execute arbitrary commands on affected routers, potentially gaining full control. All users of the listed router models with vulnerable firmware versions are affected.
💻 Affected Systems
- BL-WR9000
- BL-AC1900
- BL-AC2100_AZ3
- BL-X10_AC8
- BL-LTE300
- BL-F1200_AT1
- BL-X26_AC8
- BLAC450M_AE4
- BL-X26_DA3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router compromise allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use the router for botnet activities.
Likely Case
Router takeover leading to DNS hijacking, credential theft from network traffic, and use as a proxy for malicious activities.
If Mitigated
Limited impact if routers are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.
🎯 Exploit Status
The GitHub reference contains technical details and likely exploit code. Command injection vulnerabilities are typically easy to exploit once details are public.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: Yes
Instructions:
1. Check vendor website for firmware updates. 2. Download appropriate firmware for your model. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.
🔧 Temporary Workarounds
Disable remote administration
allPrevent external access to router web interface
Network segmentation
allIsolate router management interface to separate VLAN
🧯 If You Can't Patch
- Replace vulnerable routers with different models or brands
- Implement strict firewall rules blocking all inbound access to router management interfaces
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface and compare with affected versions list. If version matches exactly, device is vulnerable.
Check Version:
Login to router web interface and navigate to System Status or About page to view firmware version.
Verify Fix Applied:
After updating firmware, verify version no longer matches vulnerable versions. Test routepwd parameter functionality if possible.
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in system logs
- Multiple failed login attempts followed by routepwd parameter manipulation
- Unexpected process execution
Network Indicators:
- Unusual outbound connections from router
- DNS queries to suspicious domains
- Unexpected traffic redirection
SIEM Query:
source="router_logs" AND (routepwd OR command=* OR process=*)