CVE-2025-44844

6.5 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attackers to execute arbitrary commands via the FileName parameter in the setUpgradeFW function. Attackers can exploit this to gain unauthorized access, modify device configurations, or launch further attacks. Only users of TOTOLINK CA600-PoE routers with the specific vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • TOTOLINK CA600-PoE
Versions: V5.3c.6665_B20180820
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface's firmware upgrade functionality. Devices with management interfaces exposed to untrusted networks are at highest risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent backdoors, pivot to internal networks, intercept network traffic, or brick the device.

🟠

Likely Case

Unauthorized command execution leading to device configuration changes, credential theft, or use as a foothold for lateral movement.

🟢

If Mitigated

Limited impact with proper network segmentation, firewall rules blocking management interfaces, and monitoring for suspicious activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The GitHub reference contains technical details and proof-of-concept. Exploitation requires access to the device's management interface but does not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check TOTOLINK's official website for firmware updates. 2. Download the latest firmware version. 3. Access the router's web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and apply the new firmware. 6. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the router's management interface from untrusted networks

Access Control Lists

linux

Implement firewall rules to restrict access to the router's management interface

iptables -A INPUT -p tcp --dport 80 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Segment the device on a dedicated VLAN with strict firewall rules
  • Implement network monitoring for suspicious traffic to/from the device

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the router's web interface under System Status > Firmware Version

Check Version:

curl -s http://router-ip/status.cgi | grep -i firmware

Verify Fix Applied:

Verify the firmware version has been updated to a version newer than V5.3c.6665_B20180820

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware upgrade attempts
  • Unexpected command execution in system logs
  • Multiple failed upgrade attempts

Network Indicators:

  • HTTP POST requests to /cgi-bin/setUpgradeFW with unusual FileName parameters
  • Outbound connections from the router to unexpected destinations

SIEM Query:

source="router_logs" AND (event="firmware_upgrade" OR event="command_execution") AND (FileName="*;*" OR FileName="*|*" OR FileName="*`*")

🔗 References

📤 Share & Export