Skip to main content

CVE-2025-3992: Buffer Overflow in TOTOLINK N150RT

High
VulnerabilityCVE-2025-3992cvecve-2025-3992
Published: Mon Apr 28 2025 (04/28/2025, 00:00:06 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability has been found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWlwds. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:32:37 UTC

Technical Analysis

CVE-2025-3992 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified portion of the code handling the /boafrm/formWlwds endpoint, where improper validation or sanitization of the 'submit-url' parameter allows an attacker to overflow a buffer. This type of vulnerability can lead to arbitrary code execution or cause the device to crash, potentially resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with high exploitability. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability affects network infrastructure devices that are often deployed in home and small office environments, but could also be present in enterprise branch offices or smaller organizations using this model. The absence of available patches or vendor advisories at the time of publication further elevates the risk, as vulnerable devices remain exposed. Attackers exploiting this flaw could gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity, which could serve as a foothold for further lateral movement within affected networks.

Potential Impact

For European organizations, the exploitation of CVE-2025-3992 could have severe consequences. Compromised TOTOLINK N150RT routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of critical communications. Small and medium enterprises (SMEs) and home office setups relying on this router model may face network outages or data breaches. Given the router’s role in managing network traffic, attackers could manipulate routing or DNS settings, enabling man-in-the-middle attacks or redirecting users to malicious sites. The integrity and availability of network services could be compromised, affecting business operations and potentially leading to regulatory non-compliance under GDPR if personal data is exposed. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous, as attackers can launch automated attacks at scale. Additionally, the public disclosure of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices across Europe.

Mitigation Recommendations

1. Immediate inventory and identification of all TOTOLINK N150RT devices running firmware version 3.4.0-B20190525 within the organization’s network. 2. Isolate vulnerable devices from critical network segments until a patch or firmware update is available. 3. Implement network-level protections such as firewall rules to restrict access to the /boafrm/formWlwds endpoint, limiting exposure to trusted management IPs only. 4. Monitor network traffic for unusual requests targeting the submit-url parameter or signs of buffer overflow exploitation attempts. 5. Engage with TOTOLINK support channels to obtain or request security patches or firmware updates addressing this vulnerability. 6. If patching is not immediately possible, consider replacing vulnerable devices with alternative models or vendors that have no known vulnerabilities. 7. Employ network segmentation to minimize the impact of a compromised router on the broader organizational network. 8. Educate IT staff on the specifics of this vulnerability to enhance detection and response capabilities. 9. Regularly update intrusion detection and prevention systems (IDS/IPS) signatures to detect exploitation attempts related to this CVE. 10. Maintain backups of router configurations and critical network data to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T08:15:52.818Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef8d4

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 6:32:37 PM

Last updated: 7/29/2025, 8:23:59 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats