CVE-2025-51390

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK N600R routers that allows attackers to execute arbitrary commands on the device. The vulnerability exists in the setWiFiWpsConfig function via the pin parameter. Anyone using the affected router version is potentially vulnerable to remote compromise.

💻 Affected Systems

Products:
  • TOTOLINK N600R
Versions: V4.3.0cu.7647_B20210106
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the web interface/management functionality. All devices running this firmware version are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and participation in botnets.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and strong network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept code is publicly available on GitHub. Exploitation requires access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://totolink.com

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates
2. Download latest firmware for N600R
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update completes

🔧 Temporary Workarounds

Disable WPS functionality

all

Turn off WiFi Protected Setup feature to remove vulnerable code path

Restrict management interface access

all

Limit access to router admin interface to trusted IP addresses only

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Disable remote management and only allow local network access to admin interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or Firmware Upgrade section

Check Version:

Login to router web interface and navigate to System Status page

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V4.3.0cu.7647_B20210106

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts to admin interface
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND ("setWiFiWpsConfig" OR "pin parameter" OR "command injection")

🔗 References

📤 Share & Export