Skip to main content

CVE-2025-3989: Buffer Overflow in TOTOLINK N150RT

High
VulnerabilityCVE-2025-3989cvecve-2025-3989
Published: Sun Apr 27 2025 (04/27/2025, 22:31:06 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability classified as critical was found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this vulnerability is an unknown functionality of the file /boafrm/formStaticDHCP. The manipulation of the argument Hostname leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:05:42 UTC

Technical Analysis

CVE-2025-3989 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT wireless router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality related to the /boafrm/formStaticDHCP endpoint, where manipulation of the 'Hostname' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely send crafted input to the device without requiring authentication or user interaction, exploiting the vulnerability over the network. The buffer overflow can lead to arbitrary code execution, potentially allowing the attacker to take full control of the affected router. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) and a score of 8.7, the vulnerability is highly exploitable with low attack complexity and no user interaction needed, but it requires low privileges (likely a network-level access or limited authentication). The impact covers confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, disrupt network services, or intercept and manipulate network traffic. Although no public exploits are currently observed in the wild, the disclosure of a proof-of-concept exploit increases the risk of exploitation. The TOTOLINK N150RT is a consumer-grade router commonly used in small office and home environments, which may be deployed in various European organizations, especially small businesses and remote offices. The vulnerability's exploitation could lead to network compromise, lateral movement, and data exfiltration within affected networks.

Potential Impact

For European organizations, exploitation of this vulnerability could result in significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, bypass perimeter defenses, and conduct further attacks such as man-in-the-middle, data interception, or deployment of malware. Small and medium enterprises (SMEs) using TOTOLINK N150RT devices may face disruption of internet connectivity, loss of sensitive data, and potential regulatory non-compliance under GDPR if personal data is exposed. The integrity of network communications could be undermined, affecting business operations and trust. Additionally, the availability of network services could be impacted, leading to downtime and operational losses. Given the remote exploitability without user interaction, attackers can automate attacks at scale, increasing the threat to organizations with widespread deployment of this device. The lack of a patch at the time of disclosure further elevates risk, necessitating immediate mitigation measures.

Mitigation Recommendations

1. Immediate network segmentation: Isolate TOTOLINK N150RT devices from critical network segments to limit potential lateral movement if compromised. 2. Disable or restrict access to the /boafrm/formStaticDHCP endpoint if possible via device configuration or firewall rules to prevent exploitation attempts. 3. Monitor network traffic for unusual activity targeting the affected endpoint or unusual DHCP-related requests. 4. Replace or upgrade affected devices where possible, prioritizing models with vendor patches or newer firmware versions. 5. If firmware updates become available, apply them promptly after testing in a controlled environment. 6. Implement strict access controls on router management interfaces, including changing default credentials and limiting management access to trusted IPs. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability to detect and block exploit attempts. 8. Educate IT staff to recognize signs of router compromise and establish incident response procedures specific to network infrastructure devices. 9. For organizations with remote or home offices using these routers, provide guidance and support to end-users to secure or replace vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T08:15:44.805Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef7fa

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 7:05:42 PM

Last updated: 8/1/2025, 6:50:11 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats