OS Command Injection Vulnerability in TOTOLINK EX1800T Router
CVE-2025-2095
Key Information:
Badges
Summary
A security vulnerability exists in the TOTOLINK EX1800T router due to improper handling of input in the setDmzCfg function within the cstecgi.cgi file. An attacker can exploit this weakness through crafted requests, allowing for remote execution of arbitrary commands on the operating system. This presents significant risks, including unauthorized access and potential control over networked devices. It is crucial for users of the affected version to implement mitigation measures and stay updated on security advisories.
Affected Version(s)
EX1800T 9.1.0cu.2112_B20220316
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved