CVE-2025-4460: Cross Site Scripting in TOTOLINK N150RT
A vulnerability classified as problematic has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the component URL Filtering Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4460 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability resides in the URL Filtering Page component of the router's web interface. An attacker can remotely exploit this flaw by injecting malicious scripts into the URL filtering functionality, which is then executed in the context of the victim's browser. This type of vulnerability allows attackers to perform actions such as stealing session cookies, redirecting users to malicious sites, or executing arbitrary JavaScript code within the victim's browser session. The vulnerability is classified as 'problematic' with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The CVSS vector indicates that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting the primary risk is to user session integrity and potential phishing or session hijacking attacks rather than direct system compromise. No patches or known exploits in the wild have been reported at the time of publication, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require special conditions such as scope changes or authentication bypass beyond high privileges, which implies that an attacker would need to have some level of authenticated access to the router's management interface to exploit this issue. Given the nature of the device—a consumer or small office router—the vulnerability could be leveraged in targeted attacks against network administrators or users with access to the router's web interface.
Potential Impact
For European organizations, the impact of CVE-2025-4460 depends largely on the deployment of TOTOLINK N150RT routers within their network infrastructure. While this device is typically used in small office or home environments, organizations that use these routers for branch offices or remote workers could face risks of session hijacking or unauthorized actions via the router's web interface. The XSS vulnerability could be exploited to steal credentials or manipulate router settings if an attacker gains access to the management interface, potentially leading to network misconfigurations or further compromise. Although the vulnerability requires high privileges and user interaction, social engineering or insider threats could facilitate exploitation. The medium severity rating reflects a moderate risk; however, the exposure of router management interfaces to the internet or insufficient network segmentation could elevate the threat. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized access resulting from such vulnerabilities, especially if exploited to pivot into internal networks. Additionally, the public disclosure of the exploit increases the urgency for mitigation to prevent opportunistic attacks.
Mitigation Recommendations
To mitigate CVE-2025-4460 effectively, European organizations should: 1) Immediately verify if TOTOLINK N150RT routers running version 3.4.0-B20190525 are in use within their environment, including remote or branch offices. 2) Restrict access to the router's management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3) Enforce strong authentication mechanisms and change default credentials to reduce the risk of privilege escalation. 4) Disable or restrict URL filtering features if not required, minimizing the attack surface. 5) Monitor router logs and network traffic for unusual activity that could indicate exploitation attempts. 6) Engage with TOTOLINK or authorized vendors to obtain firmware updates or patches addressing this vulnerability; if no patch is available, consider replacing affected devices with more secure alternatives. 7) Educate users and administrators about the risks of social engineering and the importance of not interacting with suspicious links or prompts within the router interface. 8) Implement web application firewalls (WAF) or intrusion detection systems (IDS) that can detect and block XSS attack patterns targeting router management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4460: Cross Site Scripting in TOTOLINK N150RT
Description
A vulnerability classified as problematic has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the component URL Filtering Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4460 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability resides in the URL Filtering Page component of the router's web interface. An attacker can remotely exploit this flaw by injecting malicious scripts into the URL filtering functionality, which is then executed in the context of the victim's browser. This type of vulnerability allows attackers to perform actions such as stealing session cookies, redirecting users to malicious sites, or executing arbitrary JavaScript code within the victim's browser session. The vulnerability is classified as 'problematic' with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The CVSS vector indicates that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting the primary risk is to user session integrity and potential phishing or session hijacking attacks rather than direct system compromise. No patches or known exploits in the wild have been reported at the time of publication, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require special conditions such as scope changes or authentication bypass beyond high privileges, which implies that an attacker would need to have some level of authenticated access to the router's management interface to exploit this issue. Given the nature of the device—a consumer or small office router—the vulnerability could be leveraged in targeted attacks against network administrators or users with access to the router's web interface.
Potential Impact
For European organizations, the impact of CVE-2025-4460 depends largely on the deployment of TOTOLINK N150RT routers within their network infrastructure. While this device is typically used in small office or home environments, organizations that use these routers for branch offices or remote workers could face risks of session hijacking or unauthorized actions via the router's web interface. The XSS vulnerability could be exploited to steal credentials or manipulate router settings if an attacker gains access to the management interface, potentially leading to network misconfigurations or further compromise. Although the vulnerability requires high privileges and user interaction, social engineering or insider threats could facilitate exploitation. The medium severity rating reflects a moderate risk; however, the exposure of router management interfaces to the internet or insufficient network segmentation could elevate the threat. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized access resulting from such vulnerabilities, especially if exploited to pivot into internal networks. Additionally, the public disclosure of the exploit increases the urgency for mitigation to prevent opportunistic attacks.
Mitigation Recommendations
To mitigate CVE-2025-4460 effectively, European organizations should: 1) Immediately verify if TOTOLINK N150RT routers running version 3.4.0-B20190525 are in use within their environment, including remote or branch offices. 2) Restrict access to the router's management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3) Enforce strong authentication mechanisms and change default credentials to reduce the risk of privilege escalation. 4) Disable or restrict URL filtering features if not required, minimizing the attack surface. 5) Monitor router logs and network traffic for unusual activity that could indicate exploitation attempts. 6) Engage with TOTOLINK or authorized vendors to obtain firmware updates or patches addressing this vulnerability; if no patch is available, consider replacing affected devices with more secure alternatives. 7) Educate users and administrators about the risks of social engineering and the importance of not interacting with suspicious links or prompts within the router interface. 8) Implement web application firewalls (WAF) or intrusion detection systems (IDS) that can detect and block XSS attack patterns targeting router management interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-08T19:07:37.110Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd776a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:40:46 AM
Last updated: 8/17/2025, 1:06:14 PM
Views: 14
Related Threats
CVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumCVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.