CVE-2025-9780
TOTOLINK · TOTOLINK Multiple Products
A high-severity vulnerability has been identified in multiple TOTOLINK network devices, allowing an unauthenticated remote attacker to execute arbitrary commands.
Executive summary
A high-severity vulnerability has been identified in multiple TOTOLINK network devices, allowing an unauthenticated remote attacker to execute arbitrary commands. Successful exploitation could lead to a complete compromise of the affected router, enabling the attacker to intercept network traffic, attack other devices on the internal network, or use the device in a botnet.
Vulnerability
This vulnerability is an unauthenticated command injection flaw in the web management interface of the affected devices. An attacker can send a specially crafted HTTP request to a specific administrative endpoint without needing to provide valid credentials. The device fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary operating system commands with root-level privileges, resulting in a full system compromise.
Business impact
This vulnerability presents a significant risk to the organization, reflected by its High severity rating with a CVSS score of 8.8. Exploitation could lead to a complete loss of confidentiality, integrity, and availability of the network infrastructure managed by the affected device. Potential consequences include the interception of sensitive data traversing the network, unauthorized access to internal network resources, service disruption, and the use of the compromised device to launch further attacks or contribute to a distributed denial-of-service (DDoS) botnet.
Remediation
Immediate Action: Organizations must apply the security updates provided by TOTOLINK to all affected devices immediately. After patching, system administrators should review device access logs and network traffic logs for any signs of compromise or anomalous activity that may have occurred prior to remediation.
Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the affected devices. Look for unusual outbound connections, unexpected spikes in traffic, or requests to the device's web interface containing suspicious patterns or shell commands. Monitor system processes and resource utilization on the devices for any unauthorized or unexpected behavior.
Compensating Controls: If immediate patching is not feasible, restrict all access to the device's web management interface from the internet or any untrusted network. If remote management is necessary, it should be strictly firewalled and limited to a trusted set of IP addresses. Implement network segmentation to limit the potential impact of a compromised device on other critical internal assets.
Exploitation status
Public Exploit Available: true
Analyst recommendation
Given the high severity (CVSS 8.8) of this vulnerability and the public availability of exploit code, we strongly recommend that organizations prioritize the immediate patching of all affected TOTOLINK devices. This vulnerability represents a critical threat to the network perimeter. Even though it is not currently on the CISA KEV list, it should be treated with the highest urgency. If patching cannot be performed immediately, the compensating controls outlined above must be implemented without delay to reduce the attack surface.