Skip to main content

CVE-2025-3993: Buffer Overflow in TOTOLINK N150RT

High
VulnerabilityCVE-2025-3993cvecve-2025-3993
Published: Mon Apr 28 2025 (04/28/2025, 00:31:07 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:32:20 UTC

Technical Analysis

CVE-2025-3993 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically affecting firmware version 3.4.0-B20190525. The vulnerability arises from improper handling of the 'submit-url' argument within the /boafrm/formWsc endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require privileges or user interaction (PR:L, UI:N). The impact on confidentiality, integrity, and availability is high, indicating that successful exploitation could lead to full compromise of the device, including unauthorized access, manipulation of router settings, or disruption of network services. Although no public exploit has been observed in the wild yet, the exploit details have been disclosed publicly, increasing the risk of imminent attacks. The router model affected, TOTOLINK N150RT, is a low-cost consumer-grade wireless router commonly used in small offices and home environments. The vulnerability is significant because routers are critical network infrastructure components, and compromise can lead to lateral movement within networks, interception of traffic, or use as a foothold for further attacks.

Potential Impact

For European organizations, the exploitation of this vulnerability could result in severe network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, intercept sensitive communications, or launch man-in-the-middle attacks. Small and medium enterprises (SMEs) and home office setups using the TOTOLINK N150RT are particularly at risk, as these environments often lack robust network segmentation and monitoring. The high severity of the vulnerability means that attackers could gain persistent control over network traffic, potentially leading to data exfiltration, disruption of business operations, or use of the compromised device in botnets for broader attacks. Given the remote exploitability and lack of required authentication, attackers can target vulnerable devices en masse, increasing the risk of widespread impact. Additionally, critical sectors such as healthcare, finance, and government entities using these devices in peripheral or branch networks could face escalated risks due to the strategic value of their data and services.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-3993 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement if compromised. 3. Access control: Restrict remote management interfaces and disable WAN-side access to router configuration pages, especially the /boafrm/formWsc endpoint. 4. Intrusion detection: Deploy network monitoring tools to detect anomalous traffic patterns targeting the vulnerable endpoint or unusual router behavior. 5. Device replacement: For environments where patching is not feasible or devices are end-of-life, consider replacing TOTOLINK N150RT routers with models from vendors with active security support. 6. Vendor engagement: Encourage TOTOLINK to provide timely patches and security advisories. 7. User awareness: Educate users about the risks of using outdated router firmware and the importance of regular updates. These steps go beyond generic advice by focusing on network architecture adjustments, proactive monitoring, and vendor interaction specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T08:15:55.995Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef8dc

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 6:32:20 PM

Last updated: 8/16/2025, 1:43:17 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats