CVE-2025-3995: Cross Site Scripting in TOTOLINK N150RT
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /boafrm/fromStaticDHCP of the component LAN Settings Page. The manipulation of the argument Hostname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3995 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality within the LAN Settings Page, particularly in the /boafrm/fromStaticDHCP endpoint. The issue arises from improper sanitization of the 'Hostname' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, although it requires user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H) but with user interaction (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L) with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The XSS flaw could be leveraged by attackers to execute arbitrary JavaScript in the context of the router's web interface, potentially enabling session hijacking, phishing, or manipulation of router settings if the victim is an authenticated user accessing the management interface. Given the router’s role as a network gateway device, exploitation could facilitate further attacks within the local network or compromise network traffic confidentiality and integrity indirectly. The vulnerability is classified as medium severity due to the limited impact scope and the requirement for user interaction, but the remote attack vector and the potential for abuse in targeted attacks warrant attention.
Potential Impact
For European organizations, the impact of CVE-2025-3995 can vary depending on the deployment scale of TOTOLINK N150RT routers. In environments where these routers are used, especially in small offices or home office (SOHO) settings, exploitation could lead to unauthorized access to router management interfaces, enabling attackers to alter network configurations, redirect traffic, or deploy further malicious payloads. This could compromise internal network security, data confidentiality, and integrity. While the vulnerability itself does not directly cause denial of service or full system compromise, it can be a stepping stone for more sophisticated attacks such as man-in-the-middle (MitM) or credential theft. The requirement for user interaction limits mass exploitation but does not eliminate risk in targeted phishing or social engineering campaigns. Organizations relying on these devices without proper network segmentation or monitoring may face increased risk of lateral movement by attackers. Additionally, compromised routers could be used as part of botnets or for launching further attacks, impacting overall network availability and reputation. The medium severity rating suggests that while immediate catastrophic impact is unlikely, the vulnerability should be addressed promptly to prevent exploitation in multi-stage attack scenarios.
Mitigation Recommendations
1. Immediate firmware upgrade: Check TOTOLINK’s official channels for any patches or firmware updates addressing this vulnerability and apply them promptly. 2. Network segmentation: Isolate management interfaces of routers from general user networks to reduce exposure. 3. Access controls: Restrict access to the router’s web interface to trusted IP addresses or via VPN to prevent unauthorized remote access. 4. Disable remote management: If not required, disable remote web management features to eliminate remote attack vectors. 5. Input validation and filtering: Implement web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block malicious payloads targeting the router’s management interface. 6. User awareness: Educate users about phishing and social engineering risks that could trigger the user interaction needed for exploitation. 7. Monitoring and logging: Enable detailed logging on routers and monitor for unusual access patterns or configuration changes. 8. Alternative hardware: For critical environments, consider replacing affected TOTOLINK N150RT devices with routers from vendors with stronger security track records and active patch management. These measures go beyond generic advice by focusing on network architecture changes, access restrictions, and user behavior to mitigate the specific nature of this XSS vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-3995: Cross Site Scripting in TOTOLINK N150RT
Description
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /boafrm/fromStaticDHCP of the component LAN Settings Page. The manipulation of the argument Hostname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3995 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically in firmware version 3.4.0-B20190525. The vulnerability resides in an unspecified functionality within the LAN Settings Page, particularly in the /boafrm/fromStaticDHCP endpoint. The issue arises from improper sanitization of the 'Hostname' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, although it requires user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H) but with user interaction (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L) with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The XSS flaw could be leveraged by attackers to execute arbitrary JavaScript in the context of the router's web interface, potentially enabling session hijacking, phishing, or manipulation of router settings if the victim is an authenticated user accessing the management interface. Given the router’s role as a network gateway device, exploitation could facilitate further attacks within the local network or compromise network traffic confidentiality and integrity indirectly. The vulnerability is classified as medium severity due to the limited impact scope and the requirement for user interaction, but the remote attack vector and the potential for abuse in targeted attacks warrant attention.
Potential Impact
For European organizations, the impact of CVE-2025-3995 can vary depending on the deployment scale of TOTOLINK N150RT routers. In environments where these routers are used, especially in small offices or home office (SOHO) settings, exploitation could lead to unauthorized access to router management interfaces, enabling attackers to alter network configurations, redirect traffic, or deploy further malicious payloads. This could compromise internal network security, data confidentiality, and integrity. While the vulnerability itself does not directly cause denial of service or full system compromise, it can be a stepping stone for more sophisticated attacks such as man-in-the-middle (MitM) or credential theft. The requirement for user interaction limits mass exploitation but does not eliminate risk in targeted phishing or social engineering campaigns. Organizations relying on these devices without proper network segmentation or monitoring may face increased risk of lateral movement by attackers. Additionally, compromised routers could be used as part of botnets or for launching further attacks, impacting overall network availability and reputation. The medium severity rating suggests that while immediate catastrophic impact is unlikely, the vulnerability should be addressed promptly to prevent exploitation in multi-stage attack scenarios.
Mitigation Recommendations
1. Immediate firmware upgrade: Check TOTOLINK’s official channels for any patches or firmware updates addressing this vulnerability and apply them promptly. 2. Network segmentation: Isolate management interfaces of routers from general user networks to reduce exposure. 3. Access controls: Restrict access to the router’s web interface to trusted IP addresses or via VPN to prevent unauthorized remote access. 4. Disable remote management: If not required, disable remote web management features to eliminate remote attack vectors. 5. Input validation and filtering: Implement web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block malicious payloads targeting the router’s management interface. 6. User awareness: Educate users about phishing and social engineering risks that could trigger the user interaction needed for exploitation. 7. Monitoring and logging: Enable detailed logging on routers and monitor for unusual access patterns or configuration changes. 8. Alternative hardware: For critical environments, consider replacing affected TOTOLINK N150RT devices with routers from vendors with stronger security track records and active patch management. These measures go beyond generic advice by focusing on network architecture changes, access restrictions, and user behavior to mitigate the specific nature of this XSS vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T08:16:01.610Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef462
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 9:20:53 PM
Last updated: 8/11/2025, 2:15:07 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.