Skip to main content

CVE-2025-4462: Buffer Overflow in TOTOLINK N150RT

High
VulnerabilityCVE-2025-4462cvecve-2025-4462
Published: Fri May 09 2025 (05/09/2025, 05:00:07 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK N150RT 3.4.0-B20190525. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument localPin leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:42:43 UTC

Technical Analysis

CVE-2025-4462 is a critical buffer overflow vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The vulnerability arises from improper handling of the 'localPin' argument in the processing of the /boafrm/formWsc endpoint. An attacker can remotely manipulate this parameter to trigger a buffer overflow condition, potentially allowing arbitrary code execution or denial of service on the affected device. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 8.7, reflecting high severity due to the ease of exploitation (network attack vector, low attack complexity), no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be active in the wild, the disclosure of the vulnerability and its exploit details increases the risk of exploitation. The TOTOLINK N150RT is a consumer-grade wireless router, commonly used in small offices and home environments, which may be deployed in various organizational contexts. The buffer overflow in the WSC (Wi-Fi Simple Configuration) form processing suggests that the vulnerability could be triggered by sending crafted HTTP requests to the router's management interface, potentially leading to full device compromise or network disruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office setups that rely on TOTOLINK N150RT routers for network connectivity. Exploitation could lead to unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of internet connectivity. Compromise of these routers could serve as a foothold for lateral movement within corporate networks or as a launch point for further attacks. Given the high impact on confidentiality, integrity, and availability, sensitive organizational data could be exposed or altered, and critical services could be interrupted. The lack of authentication requirement and remote exploitability increase the threat level, particularly in environments where these devices are directly accessible from the internet or poorly segmented from critical assets. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, amplifying its impact beyond individual organizations.

Mitigation Recommendations

Organizations should immediately assess their network infrastructure to identify any TOTOLINK N150RT devices running version 3.4.0-B20190525. Given the absence of an official patch link in the provided information, users should monitor TOTOLINK's official channels for firmware updates addressing this vulnerability. In the interim, it is critical to restrict access to the router's management interface by implementing network segmentation and firewall rules that block external access to the device's web interface (typically port 80 or 443). Disabling WSC (Wi-Fi Simple Configuration) functionality, if not required, can reduce the attack surface. Network administrators should also consider replacing vulnerable devices with models from vendors that provide timely security updates. Regularly auditing router configurations and monitoring network traffic for anomalous activity related to the /boafrm/formWsc endpoint can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability, once available, will further enhance defense. Finally, educating users about the risks of using outdated network equipment and encouraging prompt firmware updates is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-08T19:07:44.040Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd77de

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:42:43 AM

Last updated: 7/30/2025, 8:55:22 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats