Skip to main content

CVE-2025-8938: Backdoor in TOTOLINK N350R

Medium
VulnerabilityCVE-2025-8938cvecve-2025-8938
Published: Thu Aug 14 2025 (08/14/2025, 05:02:09 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: N350R

Description

A vulnerability was found in TOTOLINK N350R 1.2.3-B20130826. This issue affects the function formSysTel of the file /boafrm/formSysTel of the component Telnet Service. The manipulation of the argument TelEnabled leads to backdoor. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:10:53 UTC

Technical Analysis

CVE-2025-8938 is a medium-severity vulnerability identified in the TOTOLINK N350R router, specifically version 1.2.3-B20130826. The vulnerability resides in the Telnet Service component, within the function formSysTel located at /boafrm/formSysTel. The issue arises from improper handling of the TelEnabled argument, which can be manipulated remotely to create a backdoor on the device. This backdoor potentially allows an attacker to bypass normal authentication and gain unauthorized access to the router's administrative functions or underlying system. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability at a low to medium level, indicating that while the attacker can gain access, the scope and severity of damage may be limited by other factors such as the router's role or additional security controls. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability is significant because routers like the TOTOLINK N350R are often deployed in home and small office environments, and a backdoor could be leveraged to intercept traffic, launch further attacks on internal networks, or use the device as a pivot point for broader compromise.

Potential Impact

For European organizations, especially small businesses and home offices relying on TOTOLINK N350R routers, this vulnerability poses a risk of unauthorized remote access to network infrastructure. Exploitation could lead to interception of sensitive data, disruption of internet connectivity, or use of the compromised router as a foothold for lateral movement within the network. While the device is typically used in smaller scale environments, the impact on confidentiality and integrity of communications can be significant, particularly for remote workers or small enterprises handling sensitive information. Additionally, compromised routers could be enlisted in botnets or used to launch distributed denial-of-service (DDoS) attacks, indirectly affecting organizational operations. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially given the ease of remote exploitation without authentication or user interaction. European organizations with limited IT security resources may be particularly vulnerable if they have not updated or replaced affected devices.

Mitigation Recommendations

1. Immediate mitigation should include disabling the Telnet service on the TOTOLINK N350R router if it is not required, as this service is the attack vector. 2. If disabling Telnet is not feasible, network administrators should restrict access to the router's management interface to trusted IP addresses or VLANs, ideally isolating it from the internet-facing network. 3. Monitor network traffic for unusual Telnet connection attempts or unexpected administrative access patterns. 4. Since no official patch is currently linked, organizations should contact TOTOLINK support for firmware updates or advisories and apply any available patches promptly. 5. Consider replacing affected routers with models from vendors that provide timely security updates and have a stronger security posture. 6. Implement network segmentation to limit the impact of a compromised router on critical systems. 7. Educate users about the risks of using outdated or unsupported network devices and encourage regular firmware updates as part of security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T11:59:32.157Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689d717ead5a09ad00576d77

Added to database: 8/14/2025, 5:17:50 AM

Last enriched: 8/22/2025, 1:10:53 AM

Last updated: 9/27/2025, 7:20:50 AM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats