CVE-2025-3989: Buffer Overflow in TOTOLINK N150RT
A vulnerability classified as critical was found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this vulnerability is an unknown functionality of the file /boafrm/formStaticDHCP. The manipulation of the argument Hostname leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3989 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT wireless router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality related to the /boafrm/formStaticDHCP endpoint, where manipulation of the 'Hostname' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely send crafted input to the device without requiring authentication or user interaction, exploiting the vulnerability over the network. The buffer overflow can lead to arbitrary code execution, potentially allowing the attacker to take full control of the affected router. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) and a score of 8.7, the vulnerability is highly exploitable with low attack complexity and no user interaction needed, but it requires low privileges (likely a network-level access or limited authentication). The impact covers confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, disrupt network services, or intercept and manipulate network traffic. Although no public exploits are currently observed in the wild, the disclosure of a proof-of-concept exploit increases the risk of exploitation. The TOTOLINK N150RT is a consumer-grade router commonly used in small office and home environments, which may be deployed in various European organizations, especially small businesses and remote offices. The vulnerability's exploitation could lead to network compromise, lateral movement, and data exfiltration within affected networks.
Potential Impact
For European organizations, exploitation of this vulnerability could result in significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, bypass perimeter defenses, and conduct further attacks such as man-in-the-middle, data interception, or deployment of malware. Small and medium enterprises (SMEs) using TOTOLINK N150RT devices may face disruption of internet connectivity, loss of sensitive data, and potential regulatory non-compliance under GDPR if personal data is exposed. The integrity of network communications could be undermined, affecting business operations and trust. Additionally, the availability of network services could be impacted, leading to downtime and operational losses. Given the remote exploitability without user interaction, attackers can automate attacks at scale, increasing the threat to organizations with widespread deployment of this device. The lack of a patch at the time of disclosure further elevates risk, necessitating immediate mitigation measures.
Mitigation Recommendations
1. Immediate network segmentation: Isolate TOTOLINK N150RT devices from critical network segments to limit potential lateral movement if compromised. 2. Disable or restrict access to the /boafrm/formStaticDHCP endpoint if possible via device configuration or firewall rules to prevent exploitation attempts. 3. Monitor network traffic for unusual activity targeting the affected endpoint or unusual DHCP-related requests. 4. Replace or upgrade affected devices where possible, prioritizing models with vendor patches or newer firmware versions. 5. If firmware updates become available, apply them promptly after testing in a controlled environment. 6. Implement strict access controls on router management interfaces, including changing default credentials and limiting management access to trusted IPs. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability to detect and block exploit attempts. 8. Educate IT staff to recognize signs of router compromise and establish incident response procedures specific to network infrastructure devices. 9. For organizations with remote or home offices using these routers, provide guidance and support to end-users to secure or replace vulnerable devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-3989: Buffer Overflow in TOTOLINK N150RT
Description
A vulnerability classified as critical was found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this vulnerability is an unknown functionality of the file /boafrm/formStaticDHCP. The manipulation of the argument Hostname leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3989 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT wireless router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality related to the /boafrm/formStaticDHCP endpoint, where manipulation of the 'Hostname' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely send crafted input to the device without requiring authentication or user interaction, exploiting the vulnerability over the network. The buffer overflow can lead to arbitrary code execution, potentially allowing the attacker to take full control of the affected router. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) and a score of 8.7, the vulnerability is highly exploitable with low attack complexity and no user interaction needed, but it requires low privileges (likely a network-level access or limited authentication). The impact covers confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, disrupt network services, or intercept and manipulate network traffic. Although no public exploits are currently observed in the wild, the disclosure of a proof-of-concept exploit increases the risk of exploitation. The TOTOLINK N150RT is a consumer-grade router commonly used in small office and home environments, which may be deployed in various European organizations, especially small businesses and remote offices. The vulnerability's exploitation could lead to network compromise, lateral movement, and data exfiltration within affected networks.
Potential Impact
For European organizations, exploitation of this vulnerability could result in significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, bypass perimeter defenses, and conduct further attacks such as man-in-the-middle, data interception, or deployment of malware. Small and medium enterprises (SMEs) using TOTOLINK N150RT devices may face disruption of internet connectivity, loss of sensitive data, and potential regulatory non-compliance under GDPR if personal data is exposed. The integrity of network communications could be undermined, affecting business operations and trust. Additionally, the availability of network services could be impacted, leading to downtime and operational losses. Given the remote exploitability without user interaction, attackers can automate attacks at scale, increasing the threat to organizations with widespread deployment of this device. The lack of a patch at the time of disclosure further elevates risk, necessitating immediate mitigation measures.
Mitigation Recommendations
1. Immediate network segmentation: Isolate TOTOLINK N150RT devices from critical network segments to limit potential lateral movement if compromised. 2. Disable or restrict access to the /boafrm/formStaticDHCP endpoint if possible via device configuration or firewall rules to prevent exploitation attempts. 3. Monitor network traffic for unusual activity targeting the affected endpoint or unusual DHCP-related requests. 4. Replace or upgrade affected devices where possible, prioritizing models with vendor patches or newer firmware versions. 5. If firmware updates become available, apply them promptly after testing in a controlled environment. 6. Implement strict access controls on router management interfaces, including changing default credentials and limiting management access to trusted IPs. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability to detect and block exploit attempts. 8. Educate IT staff to recognize signs of router compromise and establish incident response procedures specific to network infrastructure devices. 9. For organizations with remote or home offices using these routers, provide guidance and support to end-users to secure or replace vulnerable devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T08:15:44.805Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef7fa
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 7:05:42 PM
Last updated: 8/1/2025, 6:50:11 AM
Views: 14
Related Threats
CVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumResearcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.