CVE-2025-6299: OS Command Injection in TOTOLINK N150RT

Medium
VulnerabilityCVE-2025-6299cvecve-2025-6299
Published: Fri Jun 20 2025 (06/20/2025, 02:00:18 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: N150RT

Description

A vulnerability classified as critical has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the file /boa/formWSC. The manipulation of the argument targetAPSsid leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/20/2025, 02:47:09 UTC

Technical Analysis

CVE-2025-6299 is a security vulnerability identified in the TOTOLINK N150RT router, specifically version 3.4.0-B20190525. The flaw resides in the handling of the 'targetAPSsid' argument within the /boa/formWSC file, which is part of the router's web interface. This vulnerability allows an attacker to perform OS command injection by manipulating this parameter. OS command injection vulnerabilities enable an attacker to execute arbitrary operating system commands on the affected device, potentially leading to full system compromise. The attack can be initiated remotely without any user interaction, but it requires high privileges (PR:H) on the device, indicating that the attacker must already have some level of authenticated access or elevated permissions. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires privileges (PR:H). The impact on confidentiality, integrity, and availability is low (VC:L, VI:L, VA:L), suggesting limited damage potential if exploited. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of future exploitation. No patches or fixes have been linked or published yet, which means affected devices remain vulnerable. The TOTOLINK N150RT is a low-cost consumer-grade wireless router, commonly used in home and small office environments. The vulnerability affects the router's firmware web interface, which is typically accessible within local networks or remotely if remote management is enabled. Given the nature of the vulnerability, an attacker with network access and elevated privileges could exploit this flaw to execute arbitrary commands, potentially leading to device compromise, network pivoting, or disruption of network services. However, the requirement for high privileges limits the ease of exploitation by unauthenticated attackers. Overall, this vulnerability represents a medium-severity risk primarily to environments where the TOTOLINK N150RT is deployed and where attackers can gain privileged access to the device's management interface.

Potential Impact

For European organizations, the impact of CVE-2025-6299 depends largely on the deployment of TOTOLINK N150RT routers within their networks. Given that TOTOLINK devices are generally targeted at home and small office users, large enterprises may have limited exposure unless these devices are used in branch offices or by remote workers. If exploited, attackers with elevated privileges could execute arbitrary commands on the router, potentially leading to unauthorized network access, interception or manipulation of network traffic, and disruption of network connectivity. This could compromise confidentiality and integrity of data traversing the network and availability of network services. The medium CVSS score and low impact on confidentiality, integrity, and availability suggest that while the vulnerability is serious, it is not likely to cause widespread catastrophic damage. However, in critical infrastructure or sensitive environments where these routers are used, exploitation could facilitate lateral movement or serve as a foothold for further attacks. The lack of public exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. European organizations with remote management enabled on these devices face higher risk due to potential remote exploitation. Overall, the threat is more significant for small businesses, home offices, and remote workers using TOTOLINK N150RT routers without proper network segmentation or security controls.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the router's management interface. Disable remote management if enabled, or restrict it to trusted IP addresses only. 2. Change default credentials and ensure strong, unique passwords are used for device administration to prevent unauthorized privilege escalation. 3. Network segmentation should be implemented to isolate vulnerable devices from critical network segments, limiting the impact of potential compromise. 4. Monitor network traffic for unusual activity originating from or targeting TOTOLINK N150RT devices, including unexpected command execution attempts or configuration changes. 5. Since no official patches are currently available, consider replacing vulnerable devices with models from vendors that provide timely security updates. 6. If replacement is not immediately feasible, apply firewall rules to limit access to the device's web interface to trusted internal networks only. 7. Educate users about the risks of enabling remote management and the importance of maintaining device firmware updates. 8. Regularly check for firmware updates from TOTOLINK and apply them promptly once available to remediate this vulnerability. 9. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts targeting known vulnerable endpoints. 10. Conduct periodic security assessments of network devices to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T07:47:47.419Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6854c8187ff74dad36a0ec85

Added to database: 6/20/2025, 2:31:52 AM

Last enriched: 6/20/2025, 2:47:09 AM

Last updated: 6/20/2025, 4:49:05 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats