A security vulnerability has been detected in LB-LINK BL-X26 1.2.8. This affects an unknown function of the file /goform/set_blacklist of the component HTTP Handler. Such manipulation of the argument mac leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Fri, 12 Sep 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Lb-link bl-x26 Firmware
CPEs cpe:2.3:h:b-link:bl-x26:-:*:*:*:*:*:*:*
cpe:2.3:o:b-link:bl-x26_firmware:1.2.8:*:*:*:*:*:*:*
cpe:2.3:h:lb-link:bl-x26:-:*:*:*:*:*:*:*
cpe:2.3:o:lb-link:bl-x26_firmware:1.2.8:*:*:*:*:*:*:*
Vendors & Products B-link
B-link bl-x26
B-link bl-x26 Firmware
Lb-link bl-x26 Firmware

Thu, 11 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared B-link
B-link bl-x26
B-link bl-x26 Firmware
CPEs cpe:2.3:h:b-link:bl-x26:-:*:*:*:*:*:*:*
cpe:2.3:o:b-link:bl-x26_firmware:1.2.8:*:*:*:*:*:*:*
Vendors & Products B-link
B-link bl-x26
B-link bl-x26 Firmware

Sun, 31 Aug 2025 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Lb-link
Lb-link bl-x26
Vendors & Products Lb-link
Lb-link bl-x26

Thu, 28 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in LB-LINK BL-X26 1.2.8. This affects an unknown function of the file /goform/set_blacklist of the component HTTP Handler. Such manipulation of the argument mac leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title LB-LINK BL-X26 HTTP set_blacklist os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-08-28T19:02:06.830Z

Updated: 2025-08-28T19:58:24.267Z

Reserved: 2025-08-28T12:15:26.934Z

Link: CVE-2025-9580

cve-icon Vulnrichment

Updated: 2025-08-28T19:58:13.533Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-28T19:15:35.343

Modified: 2025-09-12T16:18:47.093

Link: CVE-2025-9580

cve-icon Redhat

No data.