CVE-2025-44860

6.5 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK CA300-POE routers that allows attackers to execute arbitrary system commands via the Port parameter in the msg_process function. Attackers can exploit this to gain unauthorized access, modify device configurations, or launch further attacks. Organizations using the affected router version are at risk.

💻 Affected Systems

Products:
  • TOTOLINK CA300-POE
Versions: V6.2c.884_B20180522
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: This appears to be a specific firmware version; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent backdoors, pivot to internal networks, intercept network traffic, or use the device for botnet participation.

🟠

Likely Case

Unauthorized command execution leading to device configuration changes, service disruption, or credential harvesting from connected devices.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains exploit details, making this easily weaponizable. No authentication appears required based on the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload new firmware file. 6. Wait for reboot and verify version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected routers from critical networks and internet exposure

Access Control Lists

linux

Restrict access to router management interfaces

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Replace vulnerable devices with supported models
  • Implement strict network monitoring for suspicious traffic to/from affected devices

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version matches V6.2c.884_B20180522, device is vulnerable.

Check Version:

Check via web interface or ssh if enabled: cat /proc/version or similar router-specific commands.

Verify Fix Applied:

After firmware update, verify version no longer matches vulnerable version and test Port parameter functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND ("msg_process" OR "Port parameter" OR "command injection")

🔗 References

📤 Share & Export