Skip to main content

CVE-2025-3995: Cross Site Scripting in TOTOLINK N150RT

Medium
VulnerabilityCVE-2025-3995cvecve-2025-3995
Published: Mon Apr 28 2025 (04/28/2025, 01:31:06 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /boafrm/fromStaticDHCP of the component LAN Settings Page. The manipulation of the argument Hostname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:20:53 UTC

Technical Analysis

CVE-2025-3995 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality within the LAN Settings Page, particularly in the /boafrm/fromStaticDHCP endpoint. The issue arises from improper sanitization of the 'Hostname' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, although it requires user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H) but with user interaction (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L) with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The XSS flaw could be leveraged by attackers to execute arbitrary JavaScript in the context of the router's web interface, potentially enabling session hijacking, phishing, or manipulation of router settings if the victim is an authenticated user accessing the management interface. Given the router’s role as a network gateway device, exploitation could facilitate further attacks within the local network or compromise network traffic confidentiality and integrity indirectly. The vulnerability is classified as medium severity due to the limited impact scope and the requirement for user interaction, but the remote attack vector and the potential for abuse in targeted attacks warrant attention.

Potential Impact

For European organizations, the impact of CVE-2025-3995 can vary depending on the deployment scale of TOTOLINK N150RT routers. In environments where these routers are used, especially in small offices or home office (SOHO) settings, exploitation could lead to unauthorized access to router management interfaces, enabling attackers to alter network configurations, redirect traffic, or deploy further malicious payloads. This could compromise internal network security, data confidentiality, and integrity. While the vulnerability itself does not directly cause denial of service or full system compromise, it can be a stepping stone for more sophisticated attacks such as man-in-the-middle (MitM) or credential theft. The requirement for user interaction limits mass exploitation but does not eliminate risk in targeted phishing or social engineering campaigns. Organizations relying on these devices without proper network segmentation or monitoring may face increased risk of lateral movement by attackers. Additionally, compromised routers could be used as part of botnets or for launching further attacks, impacting overall network availability and reputation. The medium severity rating suggests that while immediate catastrophic impact is unlikely, the vulnerability should be addressed promptly to prevent exploitation in multi-stage attack scenarios.

Mitigation Recommendations

1. Immediate firmware upgrade: Check TOTOLINK’s official channels for any patches or firmware updates addressing this vulnerability and apply them promptly. 2. Network segmentation: Isolate management interfaces of routers from general user networks to reduce exposure. 3. Access controls: Restrict access to the router’s web interface to trusted IP addresses or via VPN to prevent unauthorized remote access. 4. Disable remote management: If not required, disable remote web management features to eliminate remote attack vectors. 5. Input validation and filtering: Implement web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block malicious payloads targeting the router’s management interface. 6. User awareness: Educate users about phishing and social engineering risks that could trigger the user interaction needed for exploitation. 7. Monitoring and logging: Enable detailed logging on routers and monitor for unusual access patterns or configuration changes. 8. Alternative hardware: For critical environments, consider replacing affected TOTOLINK N150RT devices with routers from vendors with stronger security track records and active patch management. These measures go beyond generic advice by focusing on network architecture changes, access restrictions, and user behavior to mitigate the specific nature of this XSS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T08:16:01.610Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef462

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:20:53 PM

Last updated: 8/11/2025, 2:15:07 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats