CVE-2025-45797

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical buffer overflow vulnerability in TOTOlink A950RG routers. Attackers can exploit it by sending specially crafted requests to the setNoticeCfg interface, potentially allowing remote code execution. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • TOTOlink A950RG
Versions: V4.1.2cu.5204_B20210112
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the affected firmware version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, and lateral movement to other devices on the network.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if the device is behind a firewall with strict inbound filtering and the vulnerable interface is not exposed.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing devices immediate targets.
🏢 Internal Only: HIGH - Even internally, any attacker with network access can exploit this vulnerability to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains detailed analysis and likely exploit code. The low complexity and unauthenticated nature make this highly exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is currently available. Monitor TOTOlink's official website for firmware updates addressing CVE-2025-45797.

🔧 Temporary Workarounds

Network Segmentation and Access Control

linux

Isolate the router from untrusted networks and restrict access to the management interface.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Disable Remote Management

all

Turn off remote management features if not required.

🧯 If You Can't Patch

  • Replace the device with a different model that receives security updates
  • Place the router behind a firewall that blocks all inbound traffic to the management interface

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the router's web interface under System Status or similar section.

Check Version:

curl -s http://router-ip/cgi-bin/luci/ | grep -i version

Verify Fix Applied:

Verify the firmware version has been updated to a version later than V4.1.2cu.5204_B20210112.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /lib/cste_modules/system.so with setNoticeCfg
  • Multiple failed attempts to access the management interface

Network Indicators:

  • Unusual outbound connections from the router
  • Traffic patterns suggesting command and control communication

SIEM Query:

source="router_logs" AND (uri="/lib/cste_modules/system.so" AND method="POST" AND params="setNoticeCfg")

🔗 References

📤 Share & Export