CVE-2025-4461: Cross Site Scripting in TOTOLINK N150RT
A vulnerability classified as problematic was found in TOTOLINK N150RT 3.4.0-B20190525. This vulnerability affects unknown code of the component Virtual Server Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4461 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability resides in an unspecified component referred to as the Virtual Server Page, which is likely part of the router's web-based management interface. An attacker can exploit this vulnerability remotely without requiring authentication, by manipulating input fields or parameters processed by the Virtual Server Page, causing malicious scripts to be executed in the context of the victim's browser. This type of XSS attack can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H - high privileges required contradicts, but PR:H indicates privileges required, so this is a discrepancy), no user interaction (UI:P - user interaction required), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vulnerability has been publicly disclosed, but there are no known exploits in the wild at this time. The lack of a patch link suggests that a fix may not yet be available from the vendor. Given the nature of the vulnerability, attackers could leverage it to perform phishing attacks, steal authentication tokens, or manipulate router settings if users access the router's management interface via a web browser, especially in environments where remote management is enabled.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of TOTOLINK N150RT routers within their network infrastructure. While TOTOLINK is not among the most dominant router brands in Europe, smaller businesses or home office setups might use these devices. Successful exploitation could allow attackers to hijack sessions or steal credentials of network administrators or users managing the router, potentially leading to unauthorized changes in network configurations, exposure of internal network details, or pivoting to other internal systems. This could compromise network integrity and confidentiality. In sectors with strict data protection regulations such as GDPR, any breach resulting from this vulnerability could lead to regulatory penalties and reputational damage. Additionally, if remote management is enabled and accessible from the internet, the attack surface increases significantly, raising the risk of exploitation. However, the medium severity and requirement for user interaction reduce the likelihood of widespread automated exploitation.
Mitigation Recommendations
Organizations should immediately verify if TOTOLINK N150RT routers running version 3.4.0-B20190525 are in use within their environment. If so, they should restrict access to the router's management interface by disabling remote management or limiting it to trusted IP addresses. Network segmentation should be employed to isolate management interfaces from general user networks. Users should be educated to avoid clicking on suspicious links or interacting with untrusted content that could trigger the XSS payload. Monitoring network traffic and logs for unusual activity related to router management interfaces is recommended. Since no official patch is currently available, organizations should consider upgrading to newer firmware versions once released or replacing vulnerable devices with more secure alternatives. Implementing web application firewalls (WAFs) that can detect and block XSS attempts targeting the router's interface may provide additional protection. Regular vulnerability assessments and penetration testing focusing on network devices can help identify and remediate such issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4461: Cross Site Scripting in TOTOLINK N150RT
Description
A vulnerability classified as problematic was found in TOTOLINK N150RT 3.4.0-B20190525. This vulnerability affects unknown code of the component Virtual Server Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4461 is a cross-site scripting (XSS) vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability resides in an unspecified component referred to as the Virtual Server Page, which is likely part of the router's web-based management interface. An attacker can exploit this vulnerability remotely without requiring authentication, by manipulating input fields or parameters processed by the Virtual Server Page, causing malicious scripts to be executed in the context of the victim's browser. This type of XSS attack can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H - high privileges required contradicts, but PR:H indicates privileges required, so this is a discrepancy), no user interaction (UI:P - user interaction required), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vulnerability has been publicly disclosed, but there are no known exploits in the wild at this time. The lack of a patch link suggests that a fix may not yet be available from the vendor. Given the nature of the vulnerability, attackers could leverage it to perform phishing attacks, steal authentication tokens, or manipulate router settings if users access the router's management interface via a web browser, especially in environments where remote management is enabled.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of TOTOLINK N150RT routers within their network infrastructure. While TOTOLINK is not among the most dominant router brands in Europe, smaller businesses or home office setups might use these devices. Successful exploitation could allow attackers to hijack sessions or steal credentials of network administrators or users managing the router, potentially leading to unauthorized changes in network configurations, exposure of internal network details, or pivoting to other internal systems. This could compromise network integrity and confidentiality. In sectors with strict data protection regulations such as GDPR, any breach resulting from this vulnerability could lead to regulatory penalties and reputational damage. Additionally, if remote management is enabled and accessible from the internet, the attack surface increases significantly, raising the risk of exploitation. However, the medium severity and requirement for user interaction reduce the likelihood of widespread automated exploitation.
Mitigation Recommendations
Organizations should immediately verify if TOTOLINK N150RT routers running version 3.4.0-B20190525 are in use within their environment. If so, they should restrict access to the router's management interface by disabling remote management or limiting it to trusted IP addresses. Network segmentation should be employed to isolate management interfaces from general user networks. Users should be educated to avoid clicking on suspicious links or interacting with untrusted content that could trigger the XSS payload. Monitoring network traffic and logs for unusual activity related to router management interfaces is recommended. Since no official patch is currently available, organizations should consider upgrading to newer firmware versions once released or replacing vulnerable devices with more secure alternatives. Implementing web application firewalls (WAFs) that can detect and block XSS attempts targeting the router's interface may provide additional protection. Regular vulnerability assessments and penetration testing focusing on network devices can help identify and remediate such issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-08T19:07:41.356Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd77cd
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:42:18 AM
Last updated: 8/13/2025, 6:44:21 PM
Views: 16
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.