CVE-2025-60702: n/a
A command injection vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `system.so` binary. The `setDiagnosisCfg` function retrieves the `ipDoamin` parameter from user input via `websGetVar` and concatenates it directly into a `ping` system command executed via `CsteSystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.
AI Analysis
Technical Summary
CVE-2025-60702 is a command injection vulnerability identified in the TOTOLINK A950RG router firmware version V5.9c.4592_B20191022_ALL. The flaw exists within the system.so binary, specifically in the setDiagnosisCfg function, which handles diagnostic configuration via the router’s web interface. The vulnerability stems from improper input handling: the function retrieves the ipDoamin parameter from user input using websGetVar and directly concatenates this input into a system ping command executed by CsteSystem() without any sanitization or validation. This lack of input sanitization allows an unauthenticated remote attacker to inject arbitrary shell commands by crafting malicious HTTP requests targeting the router’s web interface. Exploiting this vulnerability could enable attackers to execute arbitrary commands on the device, potentially leading to unauthorized control, data leakage, or pivoting within the network. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure relying on TOTOLINK A950RG routers. Successful exploitation could allow attackers to execute arbitrary commands remotely without authentication, potentially compromising router integrity and confidentiality of network traffic. This could lead to unauthorized network access, interception or manipulation of data, and use of the compromised router as a foothold for further attacks within the corporate network. While availability impact is low, the breach of confidentiality and integrity could have significant consequences, especially for organizations handling sensitive or regulated data. The risk is heightened in environments where these routers are deployed at network perimeters or in less monitored segments. Given the lack of known exploits, the immediate threat may be limited, but the ease of exploitation and unauthenticated nature make it a critical concern for proactive defense.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the router’s web interface by limiting it to trusted management networks or VPNs, and disabling remote management if not required. Network-level protections such as firewall rules to block unauthorized HTTP requests to the router’s management interface can reduce exposure. Monitoring network traffic for unusual or suspicious HTTP requests targeting the router’s web interface parameters can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with TOTOLINK support for firmware updates or advisories. As a longer-term measure, consider replacing vulnerable devices with routers from vendors with stronger security track records and timely patch management. Additionally, implement network segmentation to isolate critical assets from devices with known vulnerabilities and maintain up-to-date inventories of network hardware to identify affected devices quickly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60702: n/a
Description
A command injection vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `system.so` binary. The `setDiagnosisCfg` function retrieves the `ipDoamin` parameter from user input via `websGetVar` and concatenates it directly into a `ping` system command executed via `CsteSystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-60702 is a command injection vulnerability identified in the TOTOLINK A950RG router firmware version V5.9c.4592_B20191022_ALL. The flaw exists within the system.so binary, specifically in the setDiagnosisCfg function, which handles diagnostic configuration via the router’s web interface. The vulnerability stems from improper input handling: the function retrieves the ipDoamin parameter from user input using websGetVar and directly concatenates this input into a system ping command executed by CsteSystem() without any sanitization or validation. This lack of input sanitization allows an unauthenticated remote attacker to inject arbitrary shell commands by crafting malicious HTTP requests targeting the router’s web interface. Exploiting this vulnerability could enable attackers to execute arbitrary commands on the device, potentially leading to unauthorized control, data leakage, or pivoting within the network. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure relying on TOTOLINK A950RG routers. Successful exploitation could allow attackers to execute arbitrary commands remotely without authentication, potentially compromising router integrity and confidentiality of network traffic. This could lead to unauthorized network access, interception or manipulation of data, and use of the compromised router as a foothold for further attacks within the corporate network. While availability impact is low, the breach of confidentiality and integrity could have significant consequences, especially for organizations handling sensitive or regulated data. The risk is heightened in environments where these routers are deployed at network perimeters or in less monitored segments. Given the lack of known exploits, the immediate threat may be limited, but the ease of exploitation and unauthenticated nature make it a critical concern for proactive defense.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the router’s web interface by limiting it to trusted management networks or VPNs, and disabling remote management if not required. Network-level protections such as firewall rules to block unauthorized HTTP requests to the router’s management interface can reduce exposure. Monitoring network traffic for unusual or suspicious HTTP requests targeting the router’s web interface parameters can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with TOTOLINK support for firmware updates or advisories. As a longer-term measure, consider replacing vulnerable devices with routers from vendors with stronger security track records and timely patch management. Additionally, implement network segmentation to isolate critical assets from devices with known vulnerabilities and maintain up-to-date inventories of network hardware to identify affected devices quickly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691634ab6c6480bc32165ebe
Added to database: 11/13/2025, 7:42:35 PM
Last enriched: 11/20/2025, 11:13:52 PM
Last updated: 12/28/2025, 4:20:04 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15143: SQL Injection in EyouCMS
MediumCVE-2025-15142: SQL Injection in 9786 phpok3w
MediumCVE-2025-15141: Information Disclosure in Halo
LowCVE-2025-15140: SQL Injection in saiftheboss7 onlinemcqexam
MediumCVE-2025-15139: Command Injection in TRENDnet TEW-822DRE
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.