Skip to main content

CVE-2025-5504: Command Injection in TOTOLINK X2000R

Medium
VulnerabilityCVE-2025-5504cvecve-2025-5504
Published: Tue Jun 03 2025 (06/03/2025, 14:31:10 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: X2000R

Description

A vulnerability has been found in TOTOLINK X2000R 1.0.0-B20230726.1108 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWsc. The manipulation of the argument peerRptPin leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:03:07 UTC

Technical Analysis

CVE-2025-5504 is a command injection vulnerability identified in the TOTOLINK X2000R router, specifically in version 1.0.0-B20230726.1108. The vulnerability resides in the handling of the 'peerRptPin' argument within the /boafrm/formWsc endpoint. An attacker can remotely manipulate this parameter to inject arbitrary commands into the underlying system, potentially leading to unauthorized command execution. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The vendor has not responded to early notifications, and no patches or mitigations have been officially released. The CVSS v4.0 score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges or user interaction required. However, the impact on confidentiality, integrity, and availability is limited to low, which suggests that while command injection is possible, the scope or impact of commands may be constrained by the system environment or other mitigations. No known exploits are currently reported in the wild, but public disclosure of the exploit code increases the risk of exploitation. TOTOLINK X2000R is a consumer and small office/home office (SOHO) router, and such devices are often deployed in various environments, including European households and small businesses. The vulnerability could allow attackers to execute commands remotely, potentially leading to device compromise, network pivoting, or disruption of network services.

Potential Impact

For European organizations, especially small businesses and home offices using the TOTOLINK X2000R router, this vulnerability poses a risk of unauthorized remote command execution. Exploitation could lead to device takeover, interception or manipulation of network traffic, and potential lateral movement within internal networks. While the CVSS score indicates medium severity with limited impact on confidentiality, integrity, and availability, the lack of vendor response and patch availability increases exposure. Attackers could leverage this vulnerability to establish persistent access or disrupt network connectivity, impacting business operations and data security. Given the widespread use of consumer-grade routers in Europe, this vulnerability could affect a broad range of users, including remote workers and small enterprises that rely on these devices for internet access and network segmentation. The risk is heightened in environments where network segmentation and monitoring are minimal, allowing attackers to exploit the device as an entry point into corporate or home networks.

Mitigation Recommendations

1. Immediate mitigation should include isolating the affected TOTOLINK X2000R devices from critical network segments to limit potential lateral movement. 2. Disable or restrict access to the /boafrm/formWsc endpoint if possible, using firewall rules or router configuration settings to block external access to this interface. 3. Monitor network traffic for unusual requests targeting the peerRptPin parameter or unexpected command execution behaviors. 4. Replace or upgrade affected devices to models from vendors with active security support if no patch is forthcoming. 5. Employ network segmentation and implement strict access controls to minimize exposure of vulnerable devices. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting this vulnerability. 7. Regularly audit and update router firmware and configurations to ensure security best practices are followed. 8. Encourage users to change default credentials and disable unnecessary services on the router to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T05:43:34.922Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6e71

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/11/2025, 7:03:07 AM

Last updated: 8/3/2025, 4:19:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats