CVE-2025-3993: Buffer Overflow in TOTOLINK N150RT
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3993 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability arises from improper handling of the 'submit-url' argument within the /boafrm/formWsc endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require privileges or user interaction (PR:L, UI:N). The impact on confidentiality, integrity, and availability is high, indicating that successful exploitation could lead to full compromise of the device, including unauthorized access, manipulation of router settings, or disruption of network services. Although no public exploit has been observed in the wild yet, the exploit details have been disclosed publicly, increasing the risk of imminent attacks. The router model affected, TOTOLINK N150RT, is a low-cost consumer-grade wireless router commonly used in small offices and home environments. The vulnerability is significant because routers are critical network infrastructure components, and compromise can lead to lateral movement within networks, interception of traffic, or use as a foothold for further attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability could result in severe network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, intercept sensitive communications, or launch man-in-the-middle attacks. Small and medium enterprises (SMEs) and home office setups using the TOTOLINK N150RT are particularly at risk, as these environments often lack robust network segmentation and monitoring. The high severity of the vulnerability means that attackers could gain persistent control over network traffic, potentially leading to data exfiltration, disruption of business operations, or use of the compromised device in botnets for broader attacks. Given the remote exploitability and lack of required authentication, attackers can target vulnerable devices en masse, increasing the risk of widespread impact. Additionally, critical sectors such as healthcare, finance, and government entities using these devices in peripheral or branch networks could face escalated risks due to the strategic value of their data and services.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-3993 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement if compromised. 3. Access control: Restrict remote management interfaces and disable WAN-side access to router configuration pages, especially the /boafrm/formWsc endpoint. 4. Intrusion detection: Deploy network monitoring tools to detect anomalous traffic patterns targeting the vulnerable endpoint or unusual router behavior. 5. Device replacement: For environments where patching is not feasible or devices are end-of-life, consider replacing TOTOLINK N150RT routers with models from vendors with active security support. 6. Vendor engagement: Encourage TOTOLINK to provide timely patches and security advisories. 7. User awareness: Educate users about the risks of using outdated router firmware and the importance of regular updates. These steps go beyond generic advice by focusing on network architecture adjustments, proactive monitoring, and vendor interaction specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2025-3993: Buffer Overflow in TOTOLINK N150RT
Description
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3993 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability arises from improper handling of the 'submit-url' argument within the /boafrm/formWsc endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require privileges or user interaction (PR:L, UI:N). The impact on confidentiality, integrity, and availability is high, indicating that successful exploitation could lead to full compromise of the device, including unauthorized access, manipulation of router settings, or disruption of network services. Although no public exploit has been observed in the wild yet, the exploit details have been disclosed publicly, increasing the risk of imminent attacks. The router model affected, TOTOLINK N150RT, is a low-cost consumer-grade wireless router commonly used in small offices and home environments. The vulnerability is significant because routers are critical network infrastructure components, and compromise can lead to lateral movement within networks, interception of traffic, or use as a foothold for further attacks.
Potential Impact
For European organizations, the exploitation of this vulnerability could result in severe network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, intercept sensitive communications, or launch man-in-the-middle attacks. Small and medium enterprises (SMEs) and home office setups using the TOTOLINK N150RT are particularly at risk, as these environments often lack robust network segmentation and monitoring. The high severity of the vulnerability means that attackers could gain persistent control over network traffic, potentially leading to data exfiltration, disruption of business operations, or use of the compromised device in botnets for broader attacks. Given the remote exploitability and lack of required authentication, attackers can target vulnerable devices en masse, increasing the risk of widespread impact. Additionally, critical sectors such as healthcare, finance, and government entities using these devices in peripheral or branch networks could face escalated risks due to the strategic value of their data and services.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-3993 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement if compromised. 3. Access control: Restrict remote management interfaces and disable WAN-side access to router configuration pages, especially the /boafrm/formWsc endpoint. 4. Intrusion detection: Deploy network monitoring tools to detect anomalous traffic patterns targeting the vulnerable endpoint or unusual router behavior. 5. Device replacement: For environments where patching is not feasible or devices are end-of-life, consider replacing TOTOLINK N150RT routers with models from vendors with active security support. 6. Vendor engagement: Encourage TOTOLINK to provide timely patches and security advisories. 7. User awareness: Educate users about the risks of using outdated router firmware and the importance of regular updates. These steps go beyond generic advice by focusing on network architecture adjustments, proactive monitoring, and vendor interaction specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T08:15:55.995Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef8dc
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 6:32:20 PM
Last updated: 8/16/2025, 1:43:17 AM
Views: 15
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.