CVE-2025-4851: Command Injection in TOTOLINK N300RH
A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. This vulnerability affects the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4851 is a command injection vulnerability identified in the TOTOLINK N300RH router, specifically in firmware version 6.1c.1390_B20191101. The vulnerability resides in the setUploadUserData function within the /cgi-bin/cstecgi.cgi endpoint. An attacker can manipulate the 'FileName' argument to inject arbitrary commands, which the device executes. This vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/UI:N/PR:L) shows that the attack can be performed over the network with low attack complexity, no user interaction, but requires low privileges (PR:L). The impact on confidentiality, integrity, and availability is limited (VC:L/VI:L/VA:L), suggesting partial compromise rather than full system takeover. Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, raising the likelihood of future exploitation. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, potentially exposing numerous devices to compromise if unpatched. The lack of available patches or vendor mitigation at the time of disclosure increases the urgency for defensive measures.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of TOTOLINK N300RH routers within their network infrastructure. While typically consumer or small office devices, these routers may be used in branch offices or home offices, especially in remote work scenarios. Exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to network reconnaissance, lateral movement, or establishing persistent footholds. This could compromise internal network security, data confidentiality, and availability of network services. Given the medium severity and partial impact on confidentiality, integrity, and availability, the threat is significant but not catastrophic. However, the ease of remote exploitation without user interaction or authentication increases risk, especially in environments with limited network segmentation or monitoring. European organizations with remote workers or small branch offices using TOTOLINK devices should be particularly vigilant. Additionally, compromised routers could be leveraged as part of larger botnets or for launching further attacks, amplifying the threat to broader infrastructure.
Mitigation Recommendations
1. Immediate identification and inventory of TOTOLINK N300RH devices running the affected firmware version (6.1c.1390_B20191101) within the organization’s network, including remote and branch office locations. 2. Apply firmware updates or patches from TOTOLINK as soon as they become available. In the absence of official patches, consider temporary mitigations such as disabling remote management interfaces or restricting access to the /cgi-bin/cstecgi.cgi endpoint via firewall rules or access control lists. 3. Implement network segmentation to isolate vulnerable devices from critical internal systems and sensitive data. 4. Monitor network traffic for unusual activity originating from or targeting TOTOLINK devices, including unexpected command execution patterns or outbound connections. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts against CGI endpoints. 6. Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates. 7. For remote or home office users, provide secure VPN access and consider replacing vulnerable consumer-grade routers with enterprise-grade devices that receive regular security updates. 8. Regularly audit and update device inventories and firmware versions to prevent future exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-4851: Command Injection in TOTOLINK N300RH
Description
A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. This vulnerability affects the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4851 is a command injection vulnerability identified in the TOTOLINK N300RH router, specifically in firmware version 6.1c.1390_B20191101. The vulnerability resides in the setUploadUserData function within the /cgi-bin/cstecgi.cgi endpoint. An attacker can manipulate the 'FileName' argument to inject arbitrary commands, which the device executes. This vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/UI:N/PR:L) shows that the attack can be performed over the network with low attack complexity, no user interaction, but requires low privileges (PR:L). The impact on confidentiality, integrity, and availability is limited (VC:L/VI:L/VA:L), suggesting partial compromise rather than full system takeover. Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, raising the likelihood of future exploitation. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, potentially exposing numerous devices to compromise if unpatched. The lack of available patches or vendor mitigation at the time of disclosure increases the urgency for defensive measures.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of TOTOLINK N300RH routers within their network infrastructure. While typically consumer or small office devices, these routers may be used in branch offices or home offices, especially in remote work scenarios. Exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to network reconnaissance, lateral movement, or establishing persistent footholds. This could compromise internal network security, data confidentiality, and availability of network services. Given the medium severity and partial impact on confidentiality, integrity, and availability, the threat is significant but not catastrophic. However, the ease of remote exploitation without user interaction or authentication increases risk, especially in environments with limited network segmentation or monitoring. European organizations with remote workers or small branch offices using TOTOLINK devices should be particularly vigilant. Additionally, compromised routers could be leveraged as part of larger botnets or for launching further attacks, amplifying the threat to broader infrastructure.
Mitigation Recommendations
1. Immediate identification and inventory of TOTOLINK N300RH devices running the affected firmware version (6.1c.1390_B20191101) within the organization’s network, including remote and branch office locations. 2. Apply firmware updates or patches from TOTOLINK as soon as they become available. In the absence of official patches, consider temporary mitigations such as disabling remote management interfaces or restricting access to the /cgi-bin/cstecgi.cgi endpoint via firewall rules or access control lists. 3. Implement network segmentation to isolate vulnerable devices from critical internal systems and sensitive data. 4. Monitor network traffic for unusual activity originating from or targeting TOTOLINK devices, including unexpected command execution patterns or outbound connections. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts against CGI endpoints. 6. Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates. 7. For remote or home office users, provide secure VPN access and consider replacing vulnerable consumer-grade routers with enterprise-grade devices that receive regular security updates. 8. Regularly audit and update device inventories and firmware versions to prevent future exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-16T15:16:21.822Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb792
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:02:57 PM
Last updated: 8/6/2025, 7:35:05 AM
Views: 12
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.