Skip to main content

CVE-2025-4460: Cross Site Scripting in TOTOLINK N150RT

Medium
VulnerabilityCVE-2025-4460cvecve-2025-4460
Published: Fri May 09 2025 (05/09/2025, 04:00:09 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability classified as problematic has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the component URL Filtering Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:40:46 UTC

Technical Analysis

CVE-2025-4460 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability resides in the URL Filtering Page component of the router's web interface. An attacker can remotely exploit this flaw by injecting malicious scripts into the URL filtering functionality, which is then executed in the context of the victim's browser. This type of vulnerability allows attackers to perform actions such as stealing session cookies, redirecting users to malicious sites, or executing arbitrary JavaScript code within the victim's browser session. The vulnerability is classified as 'problematic' with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The CVSS vector indicates that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting the primary risk is to user session integrity and potential phishing or session hijacking attacks rather than direct system compromise. No patches or known exploits in the wild have been reported at the time of publication, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require special conditions such as scope changes or authentication bypass beyond high privileges, which implies that an attacker would need to have some level of authenticated access to the router's management interface to exploit this issue. Given the nature of the device—a consumer or small office router—the vulnerability could be leveraged in targeted attacks against network administrators or users with access to the router's web interface.

Potential Impact

For European organizations, the impact of CVE-2025-4460 depends largely on the deployment of TOTOLINK N150RT routers within their network infrastructure. While this device is typically used in small office or home environments, organizations that use these routers for branch offices or remote workers could face risks of session hijacking or unauthorized actions via the router's web interface. The XSS vulnerability could be exploited to steal credentials or manipulate router settings if an attacker gains access to the management interface, potentially leading to network misconfigurations or further compromise. Although the vulnerability requires high privileges and user interaction, social engineering or insider threats could facilitate exploitation. The medium severity rating reflects a moderate risk; however, the exposure of router management interfaces to the internet or insufficient network segmentation could elevate the threat. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized access resulting from such vulnerabilities, especially if exploited to pivot into internal networks. Additionally, the public disclosure of the exploit increases the urgency for mitigation to prevent opportunistic attacks.

Mitigation Recommendations

To mitigate CVE-2025-4460 effectively, European organizations should: 1) Immediately verify if TOTOLINK N150RT routers running version 3.4.0-B20190525 are in use within their environment, including remote or branch offices. 2) Restrict access to the router's management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3) Enforce strong authentication mechanisms and change default credentials to reduce the risk of privilege escalation. 4) Disable or restrict URL filtering features if not required, minimizing the attack surface. 5) Monitor router logs and network traffic for unusual activity that could indicate exploitation attempts. 6) Engage with TOTOLINK or authorized vendors to obtain firmware updates or patches addressing this vulnerability; if no patch is available, consider replacing affected devices with more secure alternatives. 7) Educate users and administrators about the risks of social engineering and the importance of not interacting with suspicious links or prompts within the router interface. 8) Implement web application firewalls (WAF) or intrusion detection systems (IDS) that can detect and block XSS attack patterns targeting router management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-08T19:07:37.110Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd776a

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:40:46 AM

Last updated: 8/17/2025, 1:06:14 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats