CVE-2025-1610
Published: 24 February 2025
Summary
CVE-2025-1610 is a medium-severity Command Injection (CWE-77) vulnerability in Lb-Link Ac1900 Firmware. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs such as the mac/enable argument to directly prevent OS command injection in the websGetVar function.
SI-2 mandates timely identification, reporting, and remediation of flaws like the command injection vulnerability in CVE-2025-1610.
SI-4 enables continuous monitoring of system activities to detect exploitation attempts of the remote OS command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote OS command injection in the router's public-facing web interface (/goform/set_blacklist), enabling exploitation of public-facing applications (T1190) and indirect command execution via the manipulated web parameters (T1202).
NVD Description
A vulnerability was found in LB-LINK AC1900 Router 1.0.2 and classified as critical. Affected by this issue is the function websGetVar of the file /goform/set_blacklist. The manipulation of the argument mac/enable leads to os command injection. The attack may be…
more
launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-1610 is a critical vulnerability in the LB-LINK AC1900 Router version 1.0.2, affecting the websGetVar function within the /goform/set_blacklist file. The issue enables OS command injection through manipulation of the mac/enable argument and is classified under CWE-77 and CWE-78.
The vulnerability is exploitable remotely (AV:N) by low-privileged users (PR:L) with low attack complexity (AC:L) and no user interaction (UI:N), resulting in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L). It carries a CVSS v3.1 base score of 6.3.
Advisories referenced in VulDB entries and a Notion site detail the public disclosure of an exploit. The vendor was contacted early about the issue but provided no response, and no patches or mitigations are specified.
The exploit has been disclosed publicly and may be used in attacks.
Details
- CWE(s)