Skip to main content

CVE-2025-45800: n/a

Critical
VulnerabilityCVE-2025-45800cvecve-2025-45800
Published: Fri May 02 2025 (05/02/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a command execution vulnerability in the setDeviceName interface of the /lib/cste_modules/global.so library, specifically in the processing of the deviceMac parameter.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:48:03 UTC

Technical Analysis

CVE-2025-45800 is a critical command execution vulnerability identified in the TOTOLINK A950RG router firmware version 4.1.2cu.5204_B20210112. The flaw exists within the setDeviceName interface of the /lib/cste_modules/global.so library, specifically in how the deviceMac parameter is processed. This vulnerability is classified under CWE-77, which relates to improper neutralization of special elements used in a command ('Command Injection'). An attacker can exploit this vulnerability remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation allows an attacker to execute arbitrary commands on the underlying operating system with the privileges of the affected process, potentially leading to full system compromise. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity suggest that active exploitation attempts may emerge. The vulnerability affects a widely deployed consumer and small office router model, which is often used as a gateway device, making it a high-value target for attackers seeking to infiltrate internal networks or launch further attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant. TOTOLINK routers, including the A950RG model, are commonly used in small to medium enterprises and residential environments across Europe. Exploitation could allow attackers to gain unauthorized access to internal networks, intercept or manipulate sensitive data, disrupt network availability, or use compromised devices as footholds for lateral movement or launching attacks against other targets. Given the router’s role as a network gateway, compromise could lead to exposure of confidential communications and critical infrastructure. The lack of authentication and user interaction requirements increases the risk of widespread automated exploitation campaigns. Additionally, organizations with remote or hybrid workforces relying on these routers for VPN or secure connectivity may face elevated risks of data breaches or service disruptions.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all TOTOLINK A950RG routers in their environment, including those in remote or home office locations. 2) Monitor vendor communications and security advisories for official patches or firmware updates addressing this vulnerability; apply updates promptly once available. 3) In the absence of patches, consider temporary mitigations such as disabling or restricting access to the setDeviceName interface or the affected library if feasible. 4) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data stores. 5) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 6) Enforce strict firewall rules to limit inbound access to router management interfaces, ideally restricting to trusted IP addresses or VPN connections. 7) Conduct regular network traffic analysis to identify anomalous command execution patterns or unauthorized access attempts. 8) Educate users and IT staff about the risks and signs of compromise related to router vulnerabilities. These steps go beyond generic advice by focusing on proactive identification, network architecture adjustments, and monitoring tailored to this specific vulnerability and device.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6b98

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:48:03 AM

Last updated: 8/13/2025, 10:34:38 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats