Cyber Posture

CVE-2025-1610

MediumPublic PoC

Published: 24 February 2025

Published
24 February 2025
Modified
04 November 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0031 54.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1610 is a medium-severity Command Injection (CWE-77) vulnerability in Lb-Link Ac1900 Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs such as the mac/enable argument to directly prevent OS command injection in the websGetVar function.

prevent

SI-2 mandates timely identification, reporting, and remediation of flaws like the command injection vulnerability in CVE-2025-1610.

detect

SI-4 enables continuous monitoring of system activities to detect exploitation attempts of the remote OS command injection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Why these techniques?

The vulnerability is a remote OS command injection in the router's public-facing web interface (/goform/set_blacklist), enabling exploitation of public-facing applications (T1190) and indirect command execution via the manipulated web parameters (T1202).

NVD Description

A vulnerability was found in LB-LINK AC1900 Router 1.0.2 and classified as critical. Affected by this issue is the function websGetVar of the file /goform/set_blacklist. The manipulation of the argument mac/enable leads to os command injection. The attack may be…

more

launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-1610 is a critical vulnerability in the LB-LINK AC1900 Router version 1.0.2, affecting the websGetVar function within the /goform/set_blacklist file. The issue enables OS command injection through manipulation of the mac/enable argument and is classified under CWE-77 and CWE-78.

The vulnerability is exploitable remotely (AV:N) by low-privileged users (PR:L) with low attack complexity (AC:L) and no user interaction (UI:N), resulting in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L). It carries a CVSS v3.1 base score of 6.3.

Advisories referenced in VulDB entries and a Notion site detail the public disclosure of an exploit. The vendor was contacted early about the issue but provided no response, and no patches or mitigations are specified.

The exploit has been disclosed publicly and may be used in attacks.

Details

CWE(s)

Affected Products

lb-link
ac1900 firmware
1.0.2

CVEs Like This One

CVE-2025-1609Same product: Lb-Link Ac1900
CVE-2025-1608Same product: Lb-Link Ac1900
CVE-2025-9580Same vendor: Lb-Link
CVE-2026-4228Same vendor: Lb-Link
CVE-2025-2701Shared CWE-77, CWE-78
CVE-2025-8830Shared CWE-77, CWE-78
CVE-2026-4226Same vendor: Lb-Link
CVE-2025-10773Same vendor: Lb-Link
CVE-2026-4227Same vendor: Lb-Link
CVE-2025-7788Shared CWE-77, CWE-78

References