CVE-2025-60336

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in TOTOLINK N600R routers allows attackers to crash the device via specially crafted HTTP requests, causing a denial of service. This affects users running vulnerable firmware versions, potentially disrupting network connectivity.

💻 Affected Systems

Products:
  • TOTOLINK N600R
Versions: v4.3.0cu.7866_B20220506
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface; devices with default configurations are vulnerable if web interface is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, extended network downtime, and potential loss of connectivity for all connected devices.

🟠

Likely Case

Temporary denial of service causing network disruption until device automatically reboots or is manually restarted.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring allowing quick detection and recovery.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub; exploitation requires sending crafted HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates
2. Download latest firmware for N600R
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Wait for reboot and verify version

🔧 Temporary Workarounds

Disable Web Management Interface

all

Prevent access to vulnerable HTTP interface by disabling web management

Access router CLI via SSH/Telnet
Disable HTTP service if supported

Restrict Network Access

all

Limit access to router management interface to trusted networks only

Configure firewall rules to block external access to router IP on port 80/443

🧯 If You Can't Patch

  • Implement network segmentation to isolate router from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or About page

Check Version:

curl -s http://router-ip/status.cgi | grep version

Verify Fix Applied:

Verify firmware version has been updated beyond v4.3.0cu.7866_B20220506

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to unusual endpoints
  • Router crash/reboot events
  • Connection timeouts to management interface

Network Indicators:

  • HTTP requests with malformed headers or parameters to router IP
  • Sudden loss of connectivity to router management interface

SIEM Query:

source="router.log" AND (http_uri="*sub_41773C*" OR http_status=500) OR event="device_reboot"

🔗 References

📤 Share & Export