CVE-2025-7460

8.8 HIGH

📋 TL;DR

This critical vulnerability in TOTOLINK T6 routers allows remote attackers to execute arbitrary code via a buffer overflow in the WiFi ACL rules configuration function. Attackers can exploit this by sending specially crafted HTTP POST requests to the vulnerable CGI endpoint. All users running the affected firmware version are at risk.

💻 Affected Systems

Products:
  • TOTOLINK T6
Versions: 4.1.5cu.748_B20211015
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web interface configuration. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, intercept network traffic, or use the device as part of a botnet.

🟢

If Mitigated

Denial of service or limited information disclosure if exploit attempts are blocked by network controls.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests, making internet-exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network-adjacent attacker.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exploit code is available, making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TOTOLINK official website for firmware updates. 2. Download latest firmware for T6 model. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to the vulnerable web interface

Access router admin interface -> System -> Remote Management -> Disable

Block CGI endpoint access

linux

Use firewall rules to block access to the vulnerable endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "/cgi-bin/cstecgi.cgi" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments with strict firewall rules
  • Implement network-based intrusion prevention systems to detect and block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System -> Firmware Upgrade

Check Version:

curl -s http://router-ip/cgi-bin/cstecgi.cgi | grep -i version

Verify Fix Applied:

Verify firmware version is no longer 4.1.5cu.748_B20211015

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /cgi-bin/cstecgi.cgi with setWiFiAclRules function
  • Unusual buffer overflow error messages in router logs

Network Indicators:

  • HTTP traffic containing 'mac' parameter with unusually long values
  • Multiple failed exploit attempts from single source

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/cstecgi.cgi" AND method="POST" AND params CONTAINS "setWiFiAclRules")

🔗 References

📤 Share & Export