Description
A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of the file /goform/set_wifi. The manipulation results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command injection
Action: Patch ASAP
AI Analysis

Impact

The vulnerability lies in the sub_458754 function of the /goform/set_wifi handler. An attacker can supply crafted input that is not properly sanitized, leading to arbitrary command injection on the device, as evidenced by public exploits. The issue falls under CWE‑74 and CWE‑77.

Affected Systems

The flaw impacts LB‑LINK BL‑WR9000 routers running firmware version 2.4.9. It can be triggered remotely by interacting with the router’s web interface, allowing the execution of commands on the device’s operating system.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate risk, while the EPSS score of 1% suggests a low probability of exploitation. This vulnerability is not listed in the CISA KEV catalog. Attackers with remote access to the web interface could exploit the flaw, but because no official patch or workaround is available, the actual threat depends on how exposed the device is and the protections applied by the administrator.

Generated by OpenCVE AI on March 20, 2026 at 19:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and deploy any updated LB‑LINK BL‑WR9000 firmware that addresses the command injection issue.
  • If a firmware update is unavailable, block external access to the router’s web interface using firewall rules or ACLs so that only the local network can reach it.
  • Disable remote administration features for Wi‑Fi configuration via the web interface if the router’s settings provide that option.
  • Ensure the device uses a strong, unique administrator password and enable password protection on the web interface.
  • Consider placing the router on a separate VLAN or network segment to reduce its exposure to potential attackers.

Generated by OpenCVE AI on March 20, 2026 at 19:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Lb-link bl-wr9000 Firmware
CPEs cpe:2.3:h:lb-link:bl-wr9000:-:*:*:*:*:*:*:*
cpe:2.3:o:lb-link:bl-wr9000_firmware:2.4.9:*:*:*:*:*:*:*
Vendors & Products Lb-link bl-wr9000 Firmware

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Lb-link
Lb-link bl-wr9000
Vendors & Products Lb-link
Lb-link bl-wr9000

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of the file /goform/set_wifi. The manipulation results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title LB-LINK BL-WR9000 set_wifi sub_458754 command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Lb-link Bl-wr9000 Bl-wr9000 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T16:41:59.288Z

Reserved: 2026-03-15T18:41:17.685Z

Link: CVE-2026-4228

cve-icon Vulnrichment

Updated: 2026-03-16T16:41:51.519Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:20:16.030

Modified: 2026-03-20T18:19:54.707

Link: CVE-2026-4228

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:22Z

Weaknesses