Cyber Posture

CVE-2025-1608

MediumPublic PoC

Published: 24 February 2025

Published
24 February 2025
Modified
04 November 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0081 74.3th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1608 is a medium-severity Command Injection (CWE-77) vulnerability in Lb-Link Ac1900 Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by requiring validation of untrusted inputs like the routepwd argument in the websGetVar function.

prevent

Ensures timely identification, reporting, and correction of the specific command injection flaw in the router's /goform/set_manpwd endpoint.

prevent

Restricts the type, amount, and format of inputs to the vulnerable function, reducing opportunities for successful command injection payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Direct OS command injection in public-facing router web interface (/goform/set_manpwd) enables remote exploitation of the device (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability, which was classified as critical, was found in LB-LINK AC1900 Router 1.0.2. Affected is the function websGetVar of the file /goform/set_manpwd. The manipulation of the argument routepwd leads to os command injection. It is possible to launch the…

more

attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-1608 is an OS command injection vulnerability classified as critical in the LB-LINK AC1900 Router version 1.0.2. The flaw affects the websGetVar function in the /goform/set_manpwd file, where manipulation of the routepwd argument enables command injection. It was published on 2025-02-24 and is associated with CWE-77 and CWE-78, with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

A remote attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction. Successful exploitation allows injection and execution of arbitrary operating system commands, resulting in low impacts to confidentiality, integrity, and availability.

Advisories from VulDB and a public disclosure on a Notion site detail the vulnerability and provide exploit information. The vendor was contacted early regarding the issue but has not responded, and no patches or mitigations are mentioned in the available references.

Details

CWE(s)

Affected Products

lb-link
ac1900 firmware
1.0.2

CVEs Like This One

CVE-2025-1610Same product: Lb-Link Ac1900
CVE-2025-1609Same product: Lb-Link Ac1900
CVE-2025-9580Same vendor: Lb-Link
CVE-2026-4228Same vendor: Lb-Link
CVE-2026-2175Shared CWE-77, CWE-78
CVE-2026-2210Shared CWE-77, CWE-78
CVE-2026-2260Shared CWE-77, CWE-78
CVE-2026-2081Shared CWE-77, CWE-78
CVE-2026-6158Shared CWE-77, CWE-78
CVE-2025-15472Shared CWE-77, CWE-78

References