Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67188: n/a

0
Critical
VulnerabilityCVE-2025-67188cvecve-2025-67188
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue resides in the setRadvdCfg interface of the /lib/cste_modules/ipv6.so module. The function fails to properly validate the length of the user-controlled radvdinterfacename parameter, allowing remote attackers to trigger a stack buffer overflow.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:38:27 UTC

Technical Analysis

CVE-2025-67188 is a critical security vulnerability identified in the TOTOLINK A950RG router firmware version V4.1.2cu.5204_B20210112. The flaw is a classic stack-based buffer overflow located in the setRadvdCfg interface of the /lib/cste_modules/ipv6.so module. Specifically, the vulnerability arises because the function handling the radvdinterfacename parameter does not properly validate the length of this user-controlled input. This oversight allows a remote attacker to send a specially crafted request that overflows the stack buffer, potentially overwriting the return address or other control data. Exploiting this vulnerability requires no authentication or user interaction, and can be performed remotely over the network, making it highly accessible to attackers. The consequences of successful exploitation are severe, including arbitrary code execution with root-level privileges, leading to full system compromise. This affects confidentiality by allowing data theft, integrity by enabling unauthorized modifications, and availability by potentially causing system crashes or persistent backdoors. The vulnerability is categorized under CWE-120 (Classic Buffer Overflow). Although no public exploits have been reported yet, the vulnerability’s characteristics and CVSS score of 9.8 indicate a critical risk. No official patches or firmware updates have been linked yet, emphasizing the need for proactive mitigation. The TOTOLINK A950RG router is commonly deployed in small to medium enterprise and home networks, often in European markets where TOTOLINK has a presence. Given the router’s role in network infrastructure, exploitation could facilitate lateral movement or persistent access within affected networks.

Potential Impact

For European organizations, the impact of CVE-2025-67188 is significant. The TOTOLINK A950RG router is used in various enterprise and residential environments, including small businesses and potentially critical infrastructure sectors. Exploitation can lead to complete device takeover, allowing attackers to intercept, modify, or disrupt network traffic, exfiltrate sensitive data, or use the compromised device as a foothold for further attacks within the network. This threatens the confidentiality, integrity, and availability of organizational data and services. In sectors such as finance, healthcare, and government, where data sensitivity and uptime are paramount, the consequences could be severe, including regulatory penalties under GDPR for data breaches. Additionally, compromised routers can be leveraged in botnets or to launch distributed denial-of-service (DDoS) attacks, amplifying the threat landscape. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks. The absence of known public exploits currently provides a window for mitigation, but also means organizations must act proactively to prevent future incidents.

Mitigation Recommendations

1. Immediate action should be to check for and apply any available firmware updates from TOTOLINK addressing this vulnerability. Monitor vendor communications closely for patches. 2. If patches are unavailable, restrict network access to the router’s management interfaces, especially the setRadvdCfg interface, by implementing firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable IPv6 routing or the radvd service if not required, reducing the attack surface related to the vulnerable module. 4. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection to identify and block attempts to exploit this buffer overflow. 5. Conduct regular network scans to identify devices running vulnerable firmware versions and prioritize their remediation. 6. Implement strict access controls and monitoring on network devices to detect unusual activity indicative of exploitation attempts. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving router compromise. 8. Consider deploying network-level mitigations such as VPNs or zero-trust architectures to reduce reliance on potentially vulnerable edge devices. These steps go beyond generic advice by focusing on specific controls related to the vulnerable interface and router model.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd4f9fa50a62f766326

Added to database: 2/4/2026, 8:01:24 AM

Last enriched: 2/11/2026, 11:38:27 AM

Last updated: 3/25/2026, 5:45:41 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses