| CVE ID | CVE-2025-12386 |
| Publication date | 27 January 2026 |
| Vendor | Pix-Link |
| Product | LV-WR21Q |
| Vulnerable versions | V108_108 |
| Vulnerability type (CWE) | Missing Authentication for Critical Function (CWE-306) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-12387 |
| Publication date | 27 January 2026 |
| Vendor | Pix-Link |
| Product | LV-WR21Q |
| Vulnerable versions | V108_108 |
| Vulnerability type (CWE) | Improper Check for Unusual or Exceptional Conditions (CWE-754) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in Pix-Link LV-WR21Q firmware and participated in coordination of their disclosure.
The vulnerability CVE-2025-12386: Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point.
The vulnerability CVE-2025-12387: A vulnerability in the Pix-Link LV-WR21Q router's language module allows remote attackers to trigger a denial of service (DoS) by sending a specially crafted HTTP POST request containing non-existing language parameter. This renders the server unable to serve correct lang.js file, which causes administrator panel to not work, resulting in DoS until the language settings is reverted to a correct value. The Denial of Service affects only the administrator panel and does not affect other router functionalities.
The vendor was notified early about these vulnerabilities, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Credits
We thank Wojciech Cybowski for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.