Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34319: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TOTOLINK N300RT

0
Critical
VulnerabilityCVE-2025-34319cvecve-2025-34319cwe-78
Published: Wed Dec 03 2025 (12/03/2025, 16:49:11 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: N300RT

Description

TOTOLINK N300RT wireless router firmware versions prior to V3.4.0-B20250430 (discovered in V2.1.8-B20201030.1539) contain an OS command injection vulnerability in the Boa formWsc handling functionality. An unauthenticated attacker can send specially crafted requests to trigger command execution via the targetAPSsid request parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 14:03:39 UTC

Technical Analysis

CVE-2025-34319 is an OS command injection vulnerability identified in the TOTOLINK N300RT wireless router firmware versions prior to V3.4.0-B20250430. The vulnerability stems from improper neutralization of special elements in the Boa web server's formWsc handling functionality, specifically through the targetAPSsid request parameter. An unauthenticated attacker can craft malicious HTTP requests that inject arbitrary operating system commands, which the router executes with elevated privileges. This flaw allows remote attackers to execute arbitrary code without requiring authentication or user interaction, posing a critical security risk. The vulnerability is classified under CWE-78, indicating improper sanitization of OS command inputs. The CVSS v4.0 base score is 9.3 (critical), reflecting the ease of exploitation (network attack vector, no privileges or user interaction needed) and the high impact on confidentiality, integrity, and availability. No patches or exploits in the wild are currently documented, but the vendor has acknowledged the issue. The vulnerability affects all firmware versions prior to V3.4.0-B20250430, including the initially discovered version V2.1.8-B20201030.1539. Attackers exploiting this vulnerability could gain full control over the router, manipulate network traffic, deploy malware, or disrupt network services.

Potential Impact

The impact of CVE-2025-34319 on organizations worldwide is significant due to the critical nature of the vulnerability and the widespread use of TOTOLINK N300RT routers in small to medium-sized business and home environments. Successful exploitation allows attackers to execute arbitrary commands on the router with root privileges, leading to full device compromise. This can result in interception and manipulation of network traffic, unauthorized access to internal networks, data exfiltration, deployment of persistent malware, and denial of service conditions. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface. Organizations relying on these routers for network connectivity or security may face severe confidentiality, integrity, and availability breaches. Additionally, compromised routers could be leveraged as footholds for lateral movement within corporate networks or as part of botnets for large-scale attacks. The absence of known exploits in the wild currently limits immediate risk, but the critical score and ease of exploitation necessitate urgent mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-34319, organizations should take the following specific actions: 1) Monitor TOTOLINK's official channels for firmware updates addressing this vulnerability and apply the patch immediately upon release. 2) Until a patch is available, restrict access to the router's management interface by implementing network segmentation and firewall rules that block external HTTP/HTTPS traffic to the device. 3) Disable remote management features if enabled, to reduce exposure to unauthenticated requests. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting suspicious HTTP requests targeting the targetAPSsid parameter or unusual command injection patterns. 5) Conduct network traffic monitoring for anomalies indicative of exploitation attempts, such as unexpected command execution or outbound connections from the router. 6) Replace affected devices with alternative hardware if timely patching is not feasible, especially in high-security environments. 7) Educate network administrators about the risks of unauthenticated command injection vulnerabilities and the importance of timely firmware updates. These measures go beyond generic advice by focusing on access control, monitoring, and proactive replacement strategies tailored to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.585Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69306fa987f844e860799605

Added to database: 12/3/2025, 5:13:13 PM

Last enriched: 3/5/2026, 2:03:39 PM

Last updated: 3/23/2026, 1:03:35 PM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses