CVE-2025-3992: Buffer Overflow in TOTOLINK N150RT
A vulnerability has been found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWlwds. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3992 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified portion of the code handling the /boafrm/formWlwds endpoint, where improper validation or sanitization of the 'submit-url' parameter allows an attacker to overflow a buffer. This type of vulnerability can lead to arbitrary code execution or cause the device to crash, potentially resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with high exploitability. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability affects network infrastructure devices that are often deployed in home and small office environments, but could also be present in enterprise branch offices or smaller organizations using this model. The absence of available patches or vendor advisories at the time of publication further elevates the risk, as vulnerable devices remain exposed. Attackers exploiting this flaw could gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity, which could serve as a foothold for further lateral movement within affected networks.
Potential Impact
For European organizations, the exploitation of CVE-2025-3992 could have severe consequences. Compromised TOTOLINK N150RT routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of critical communications. Small and medium enterprises (SMEs) and home office setups relying on this router model may face network outages or data breaches. Given the router’s role in managing network traffic, attackers could manipulate routing or DNS settings, enabling man-in-the-middle attacks or redirecting users to malicious sites. The integrity and availability of network services could be compromised, affecting business operations and potentially leading to regulatory non-compliance under GDPR if personal data is exposed. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous, as attackers can launch automated attacks at scale. Additionally, the public disclosure of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
1. Immediate inventory and identification of all TOTOLINK N150RT devices running firmware version 3.4.0-B20190525 within the organization’s network. 2. Isolate vulnerable devices from critical network segments until a patch or firmware update is available. 3. Implement network-level protections such as firewall rules to restrict access to the /boafrm/formWlwds endpoint, limiting exposure to trusted management IPs only. 4. Monitor network traffic for unusual requests targeting the submit-url parameter or signs of buffer overflow exploitation attempts. 5. Engage with TOTOLINK support channels to obtain or request security patches or firmware updates addressing this vulnerability. 6. If patching is not immediately possible, consider replacing vulnerable devices with alternative models or vendors that have no known vulnerabilities. 7. Employ network segmentation to minimize the impact of a compromised router on the broader organizational network. 8. Educate IT staff on the specifics of this vulnerability to enhance detection and response capabilities. 9. Regularly update intrusion detection and prevention systems (IDS/IPS) signatures to detect exploitation attempts related to this CVE. 10. Maintain backups of router configurations and critical network data to enable rapid recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2025-3992: Buffer Overflow in TOTOLINK N150RT
Description
A vulnerability has been found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWlwds. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3992 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified portion of the code handling the /boafrm/formWlwds endpoint, where improper validation or sanitization of the 'submit-url' parameter allows an attacker to overflow a buffer. This type of vulnerability can lead to arbitrary code execution or cause the device to crash, potentially resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant impact on confidentiality, integrity, and availability, with high exploitability. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability affects network infrastructure devices that are often deployed in home and small office environments, but could also be present in enterprise branch offices or smaller organizations using this model. The absence of available patches or vendor advisories at the time of publication further elevates the risk, as vulnerable devices remain exposed. Attackers exploiting this flaw could gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity, which could serve as a foothold for further lateral movement within affected networks.
Potential Impact
For European organizations, the exploitation of CVE-2025-3992 could have severe consequences. Compromised TOTOLINK N150RT routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of critical communications. Small and medium enterprises (SMEs) and home office setups relying on this router model may face network outages or data breaches. Given the router’s role in managing network traffic, attackers could manipulate routing or DNS settings, enabling man-in-the-middle attacks or redirecting users to malicious sites. The integrity and availability of network services could be compromised, affecting business operations and potentially leading to regulatory non-compliance under GDPR if personal data is exposed. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous, as attackers can launch automated attacks at scale. Additionally, the public disclosure of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
1. Immediate inventory and identification of all TOTOLINK N150RT devices running firmware version 3.4.0-B20190525 within the organization’s network. 2. Isolate vulnerable devices from critical network segments until a patch or firmware update is available. 3. Implement network-level protections such as firewall rules to restrict access to the /boafrm/formWlwds endpoint, limiting exposure to trusted management IPs only. 4. Monitor network traffic for unusual requests targeting the submit-url parameter or signs of buffer overflow exploitation attempts. 5. Engage with TOTOLINK support channels to obtain or request security patches or firmware updates addressing this vulnerability. 6. If patching is not immediately possible, consider replacing vulnerable devices with alternative models or vendors that have no known vulnerabilities. 7. Employ network segmentation to minimize the impact of a compromised router on the broader organizational network. 8. Educate IT staff on the specifics of this vulnerability to enhance detection and response capabilities. 9. Regularly update intrusion detection and prevention systems (IDS/IPS) signatures to detect exploitation attempts related to this CVE. 10. Maintain backups of router configurations and critical network data to enable rapid recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T08:15:52.818Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef8d4
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 6:32:37 PM
Last updated: 7/29/2025, 8:23:59 AM
Views: 10
Related Threats
CVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumPlex warns users to patch security vulnerability immediately
HighCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.