Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-7574 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical flaw in LB-LINK routers (BL-AC1900, etc.). πŸ’₯ **Consequences**: Attackers gain full control. CVSS Score is **HIGH** (9.8). Total compromise of Confidentiality, Integrity, and Availability.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper Authentication (CWE-287). πŸ” **Flaw**: The `reboot/restore` function in `/cgi-bin/lighttpd.cgi` lacks proper access checks. No login required for sensitive operations.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: LB-LINK Products. πŸ“‹ **Models**: BL-AC1900, BL-AC2100, BL-AC3600, BL-WR9000, BL-AX5400P, BL-AX1800. ⚠️ **Scope**: Multiple versions listed in vendor advisories.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Execute arbitrary sensitive operations. πŸ”“ **Privileges**: Bypass authentication entirely. πŸ“‚ **Data**: Full read/write access implied by High CVSS. Can reboot or restore device remotely.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. πŸ”‘ **Auth**: None required (PR:N). 🌐 **Access**: Network (AV:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“‚ **Exploit**: Yes, PoC available. πŸ”— **Source**: GitHub repos linked in references. πŸ”₯ **Status**: Publicly disclosed. Wild exploitation risk is **HIGH**.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `/cgi-bin/lighttpd.cgi`. πŸ§ͺ **Test**: Attempt `restore` or `reboot` commands without session cookies. πŸ“‘ **Tools**: Use Nmap scripts or custom HTTP requests to verify lack of auth check.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Vendor advisory exists (VDB-316272). πŸ“₯ **Patch**: Check official LB-LINK support site for firmware updates. ⏳ **Status**: Published July 2025. Updates likely available for listed models.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If no patch: 1. **Isolate**: Move router to untrusted VLAN. 2. **Block**: Firewall rules blocking external access to port 80/443. 3. **Disable**: Turn off remote management features if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Urgency**: **CRITICAL**. πŸš€ **Priority**: Patch immediately. ⚠️ **Reason**: No auth needed + High Impact + Public PoC. Immediate action required for home/SME networks.