CVE-2025-13184
📋 TL;DR
This critical vulnerability allows unauthenticated attackers to enable Telnet service and gain root access with blank password on Totolink X5000R routers. Attackers can execute arbitrary commands as root, completely compromising affected devices. Users of Totolink X5000R AX1800 routers with vulnerable firmware are affected.
💻 Affected Systems
- Totolink X5000R AX1800 Router
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and use device as botnet node.
Likely Case
Router compromise leading to credential theft, DNS hijacking, man-in-the-middle attacks, and network surveillance.
If Mitigated
Limited impact if device is behind firewall with no internet exposure and network segmentation prevents lateral movement.
🎯 Exploit Status
Simple HTTP request to cstecgi.cgi with specific parameters enables Telnet and grants root access. Exploit requires no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check Totolink website for firmware updates 2. If update available, download and flash firmware 3. Factory reset after update 4. Change all default credentials
🔧 Temporary Workarounds
Disable WAN management
allPrevent external access to router management interface
Block cstecgi.cgi access
linuxUse firewall rules to block access to vulnerable endpoint
iptables -A INPUT -p tcp --dport 80 -m string --string "cstecgi.cgi" --algo bm -j DROP
🧯 If You Can't Patch
- Replace affected routers with different vendor/model
- Place routers behind dedicated firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://[router-ip]/cstecgi.cgi?action=telnet&enable=1 and check if Telnet becomes accessible on port 23
Check Version:
Check router web interface or use nmap -sV -p 80 [router-ip] to identify firmware version
Verify Fix Applied:
Verify cstecgi.cgi endpoint no longer accepts telnet enablement commands and Telnet service remains disabled
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to cstecgi.cgi with telnet parameters
- Unexpected Telnet service activation
- Failed authentication attempts followed by successful root login
Network Indicators:
- Port 23 (Telnet) opening unexpectedly
- HTTP POST/GET requests to cstecgi.cgi endpoint
- Unusual outbound connections from router
SIEM Query:
source="router.logs" AND (uri="*cstecgi.cgi*" OR port=23)