OS Command Injection Vulnerability in TOTOLINK X18 Router
CVE-2025-1339
Key Information:
Badges
Summary
A vulnerability has been identified in the TOTOLINK X18 Router, specifically in the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. This issue allows for potential OS command injection through manipulation of the argument 'enable.' The vulnerability can be exploited remotely, raising concerns about unauthorized access and control over the router. Despite early disclosure to the vendor, no response was received, leaving the security of users at risk. Mitigation efforts are recommended to prevent exploitation.
Affected Version(s)
X18 9.1.0cu.2024_B20220329
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved