CVE-2025-44848

6.5 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attackers to execute arbitrary commands via crafted requests to the msg_process function's Url parameter. Attackers can potentially take full control of affected devices. This affects organizations using vulnerable TOTOLINK CA600-PoE routers.

💻 Affected Systems

Products:
  • TOTOLINK CA600-PoE
Versions: V5.3c.6665_B20180820
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default firmware version. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, pivot to internal networks, intercept traffic, or use the device for botnet activities.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, network reconnaissance, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict ingress filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in the GitHub repository. The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check TOTOLINK official website for firmware updates. If available, download latest firmware and follow vendor's update procedure.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules to prevent external access.

Access Control Lists

all

Implement network ACLs to restrict access to device management interfaces to trusted IPs only.

🧯 If You Can't Patch

  • Immediately remove affected devices from internet-facing positions and place behind firewalls
  • Implement strict network monitoring for unusual outbound connections from affected devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is V5.3c.6665_B20180820, device is vulnerable.

Check Version:

Check web interface at http://[device-ip]/ or via SSH if enabled

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V5.3c.6665_B20180820.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful access
  • Suspicious URL parameters in web server logs

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs
  • Unexpected SSH or telnet sessions originating from router

SIEM Query:

source="router-logs" AND (msg="command injection" OR msg="arbitrary command" OR url="*;*" OR url="*|*" OR url="*`*" OR url="*$(*")

🔗 References

📤 Share & Export