CVE-2025-14964

A · A vulnerability has been found in TOTOLINK Multiple Products

A critical remote code execution vulnerability has been discovered in multiple TOTOLINK networking products.

Executive summary

A critical remote code execution vulnerability has been discovered in multiple TOTOLINK networking products. An unauthenticated remote attacker can exploit this flaw by sending a malicious request to the device's web interface, allowing them to gain complete control, intercept network traffic, and potentially access the internal network. Due to the high severity (CVSS 9.8), immediate patching is required to prevent device compromise.

Vulnerability

This vulnerability is a stack-based buffer overflow within the web server component of the device's firmware. Specifically, the cstecgi.cgi binary improperly handles the loginAuthUrl argument. A remote attacker can send a crafted HTTP request containing an overly long string in this argument. The sprintf function, which is used to process this input, does not validate the string's length, causing it to write data beyond the allocated buffer on the stack, overwriting critical control data such as the function's return address. This allows an attacker to redirect the program's execution flow to malicious code, resulting in arbitrary code execution on the device with root privileges.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation allows a remote, unauthenticated attacker to achieve Remote Code Execution (RCE) on the affected networking device. The business impact is severe, as a compromised device can lead to a complete loss of confidentiality, integrity, and availability for the network segment it controls. Potential consequences include interception of sensitive data, redirection of users to malicious sites, deployment of malware within the network, using the device as a pivot point for further attacks, or incorporating the device into a botnet for use in DDoS attacks.

Remediation

Immediate Action: The primary remediation is to immediately apply the firmware patches provided by the vendor. Update all affected TOTOLINK devices to the latest available version that addresses this vulnerability. In parallel, system administrators should monitor for exploitation attempts by reviewing web access logs for suspicious requests targeting the /cgi-bin/cstecgi.cgi endpoint.

Proactive Monitoring: Implement enhanced monitoring on network perimeter devices. Security teams should look for GET or POST requests to /cgi-bin/cstecgi.cgi that contain an unusually long or malformed loginAuthUrl parameter. Network Intrusion Detection/Prevention Systems (IDS/IPS) should be updated with the latest signatures to detect and block known exploit patterns for this CVE as they become available.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Disable remote/WAN access to the device's web administration interface.
  • If remote management is required, ensure it is only accessible via a secure VPN connection to the internal network.
  • Utilize a Web Application Firewall (WAF) or reverse proxy to filter malicious requests targeting the vulnerable parameter.
  • Segment the network to isolate the device and limit the potential impact of a compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the risk of complete device compromise from an unauthenticated remote attacker, this vulnerability poses a significant threat. We strongly recommend that organizations prioritize the immediate patching of all affected TOTOLINK devices. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants treating it with the highest urgency. Any internet-exposed TOTOLINK devices should be considered at extreme risk and must be patched or have their management interfaces removed from public access without delay.