CVE-2025-9935

TOTOLINK · TOTOLINK N600R

**A high-severity, unspecified vulnerability in the TOTOLINK N600R router could allow a remote attacker to compromise the device, potentially gaining control over network traffic.**.

Executive summary

A high-severity, unspecified vulnerability in the TOTOLINK N600R router could allow a remote attacker to compromise the device, potentially gaining control over network traffic.

Vulnerability

An unspecified security vulnerability was determined to exist in the TOTOLINK N600R router firmware. The high CVSS score suggests this flaw could be exploited by a remote attacker, possibly without authentication, to execute arbitrary code or gain administrative control over the device.

Business impact

With a CVSS score of 7.3 (High), this vulnerability is critical. A compromised router can lead to the interception, redirection, or modification of all network traffic passing through it. An attacker could steal credentials, inject malware into user traffic, or use the device as a pivot point to attack other systems on the internal network.

Remediation

Immediate Action: Check the TOTOLINK support website for a firmware update that addresses this vulnerability and apply it immediately. This is the most critical step to secure the device.

Proactive Monitoring: Monitor network traffic for unusual patterns or connections to suspicious external IP addresses. Regularly check the router's configuration for unauthorized changes, such as modified DNS settings or new port forwarding rules.

Compensating Controls: Disable remote (WAN) administration of the router. Ensure a strong, unique administrative password is set. Change the default LAN IP address range if possible.

Exploitation status

Public Exploit Available: false

Analyst recommendation

A vulnerability in a network gateway device presents a severe risk to the entire network it protects. All owners of the affected TOTOLINK N600R model must prioritize installing the patched firmware immediately. Failure to do so leaves the network and all connected devices exposed to compromise.