Skip to main content

CVE-2025-3990: Buffer Overflow in TOTOLINK N150RT

High
VulnerabilityCVE-2025-3990cvecve-2025-3990
Published: Sun Apr 27 2025 (04/27/2025, 23:00:09 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this issue is some unknown functionality of the file /boafrm/formVlan. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:50:29 UTC

Technical Analysis

CVE-2025-3990 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality related to the /boafrm/formVlan endpoint, where manipulation of the 'submit-url' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely exploit the device without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, suggesting that successful exploitation could lead to arbitrary code execution, potentially allowing an attacker to take full control of the device, disrupt network operations, or intercept sensitive data passing through the router. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability does not require user interaction and has a low attack complexity, making it accessible to a wide range of threat actors. The lack of available patches at the time of publication further exacerbates the risk for affected users. Given that the TOTOLINK N150RT is a consumer-grade router commonly used in small offices and home environments, exploitation could serve as a foothold for attackers to pivot into larger networks or to create botnets for distributed denial-of-service (DDoS) attacks.

Potential Impact

For European organizations, particularly small and medium enterprises (SMEs) and residential users relying on TOTOLINK N150RT routers, this vulnerability poses a significant risk. Compromise of these routers could lead to unauthorized access to internal networks, interception of confidential communications, and disruption of internet connectivity. In sectors where network availability and data confidentiality are critical—such as healthcare, finance, and government—such an attack could result in operational downtime, data breaches, and regulatory non-compliance. Additionally, compromised routers could be leveraged as part of larger botnets, contributing to broader cyberattacks that may indirectly affect European organizations. The high severity and ease of exploitation mean that attackers could rapidly weaponize this vulnerability, especially in environments where firmware updates are infrequent or unsupported. The lack of authentication requirement further increases the attack surface, as attackers can target devices directly over the internet without needing credentials or user interaction.

Mitigation Recommendations

Immediately identify all TOTOLINK N150RT devices running firmware version 3.4.0-B20190525 within the network using asset management tools or network scanning. Isolate affected devices from critical network segments to limit potential lateral movement in case of compromise. Monitor network traffic for unusual activity originating from or targeting these routers, including unexpected outbound connections or anomalous DNS queries. Implement network-level protections such as firewall rules to restrict access to router management interfaces from untrusted networks, ideally limiting access to internal IP ranges only. If possible, disable remote management features on the affected routers to reduce exposure. Engage with TOTOLINK support channels to obtain any available firmware updates or patches; if none are available, consider replacing affected devices with models from vendors with active security support. Educate users and administrators about the risks of using outdated firmware and the importance of timely updates. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the /boafrm/formVlan endpoint or buffer overflow patterns. Regularly back up router configurations and maintain an incident response plan to quickly remediate any detected compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T08:15:47.591Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef863

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 6:50:29 PM

Last updated: 7/29/2025, 5:43:42 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats