Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8938: Backdoor in TOTOLINK N350R

0
Medium
VulnerabilityCVE-2025-8938cvecve-2025-8938
Published: Thu Aug 14 2025 (08/14/2025, 05:02:09 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: N350R

Description

A vulnerability was found in TOTOLINK N350R 1.2.3-B20130826. This issue affects the function formSysTel of the file /boafrm/formSysTel of the component Telnet Service. The manipulation of the argument TelEnabled leads to backdoor. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:10:53 UTC

Technical Analysis

CVE-2025-8938 is a medium-severity vulnerability identified in the TOTOLINK N350R router, specifically version 1.2.3-B20130826. The vulnerability resides in the Telnet Service component, within the function formSysTel located at /boafrm/formSysTel. The issue arises from improper handling of the TelEnabled argument, which can be manipulated remotely to create a backdoor on the device. This backdoor potentially allows an attacker to bypass normal authentication and gain unauthorized access to the router's administrative functions or underlying system. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability at a low to medium level, indicating that while the attacker can gain access, the scope and severity of damage may be limited by other factors such as the router's role or additional security controls. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability is significant because routers like the TOTOLINK N350R are often deployed in home and small office environments, and a backdoor could be leveraged to intercept traffic, launch further attacks on internal networks, or use the device as a pivot point for broader compromise.

Potential Impact

For European organizations, especially small businesses and home offices relying on TOTOLINK N350R routers, this vulnerability poses a risk of unauthorized remote access to network infrastructure. Exploitation could lead to interception of sensitive data, disruption of internet connectivity, or use of the compromised router as a foothold for lateral movement within the network. While the device is typically used in smaller scale environments, the impact on confidentiality and integrity of communications can be significant, particularly for remote workers or small enterprises handling sensitive information. Additionally, compromised routers could be enlisted in botnets or used to launch distributed denial-of-service (DDoS) attacks, indirectly affecting organizational operations. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially given the ease of remote exploitation without authentication or user interaction. European organizations with limited IT security resources may be particularly vulnerable if they have not updated or replaced affected devices.

Mitigation Recommendations

1. Immediate mitigation should include disabling the Telnet service on the TOTOLINK N350R router if it is not required, as this service is the attack vector. 2. If disabling Telnet is not feasible, network administrators should restrict access to the router's management interface to trusted IP addresses or VLANs, ideally isolating it from the internet-facing network. 3. Monitor network traffic for unusual Telnet connection attempts or unexpected administrative access patterns. 4. Since no official patch is currently linked, organizations should contact TOTOLINK support for firmware updates or advisories and apply any available patches promptly. 5. Consider replacing affected routers with models from vendors that provide timely security updates and have a stronger security posture. 6. Implement network segmentation to limit the impact of a compromised router on critical systems. 7. Educate users about the risks of using outdated or unsupported network devices and encourage regular firmware updates as part of security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T11:59:32.157Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689d717ead5a09ad00576d77

Added to database: 8/14/2025, 5:17:50 AM

Last enriched: 8/22/2025, 1:10:53 AM

Last updated: 11/7/2025, 8:41:34 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats