CVE-2025-44836
📋 TL;DR
This command injection vulnerability in TOTOLINK CP900 routers allows attackers to execute arbitrary system commands by manipulating the hour or minute parameters in the setApRebootScheCfg function. Attackers can gain unauthorized access, modify configurations, or launch further attacks. All users running the vulnerable firmware version are affected.
💻 Affected Systems
- TOTOLINK CPE CP900
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise allowing attacker to install persistent backdoors, pivot to internal networks, intercept traffic, or brick the device.
Likely Case
Unauthorized configuration changes, credential theft, or use as a foothold for further network attacks.
If Mitigated
Limited impact if device is isolated, has restricted network access, and proper input validation is implemented.
🎯 Exploit Status
Exploit requires authentication to the web interface; command injection is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check TOTOLINK website for firmware updates. 2. Download latest firmware. 3. Log into router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot device.
🔧 Temporary Workarounds
Disable remote administration
allPrevents external attackers from accessing the vulnerable interface.
Log into admin interface → System Tools → Remote Management → Disable
Restrict admin interface access
allLimit which IP addresses can access the router's admin interface.
Log into admin interface → Security → Access Control → Add allowed IPs only
🧯 If You Can't Patch
- Isolate the device in a separate VLAN with strict firewall rules
- Implement network monitoring for unusual traffic patterns from the router
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router admin interface under System Status or Firmware Upgrade section.
Check Version:
curl -s http://router-ip/status.cgi | grep firmware
Verify Fix Applied:
Verify firmware version has changed from V6.3c.1144_B20190715 to a newer version.
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in system logs
- Multiple failed login attempts followed by successful login
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic to unexpected destinations
- Port scanning originating from router
SIEM Query:
source="router.log" AND ("command injection" OR "setApRebootScheCfg" OR unusual shell commands)