CVE Alert: CVE-2025-9935 – TOTOLINK – N600R

CVE-2025-9935

HIGHNo exploitation knownPoC observed

A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
TOTOLINK
Product
N600R
Versions
4.3.0cu.7866_B20220506
CWE
CWE-77, Command Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-03T23:02:09.840Z
Updated
2025-09-04T14:38:03.901Z

AI Summary Analysis

Risk verdict

High-risk with a remote, unauthenticated command-injection, publicly disclosed PoC and automatable exploit; urgent mitigation recommended.

Why this matters

Adversaries can execute arbitrary commands on the device over the network, potentially taking control, altering configuration, or pivoting into connected networks. The public PoC and automatable nature increase likelihood of opportunistic exploitation in exposed or poorly protected deployments.

Most likely attack path

attacker requires only network access to the affected CGI endpoint; no user interaction and no authentication needed per the metrics. With a publicly available PoC and automatable exploit, an attacker could execute commands locally on the device and, from there, attempt lateral movement toward adjacent hosts or the internal network, especially if the device acts as a gateway or continues to trust internal clients.

Who is most exposed

Common in home and small-office networks with web-admin interfaces reachable from the internet or over misconfigured WAN access. Devices deployed with exposed administration surfaces or weak network segmentation are prime targets.

Detection ideas

  • Unusual HTTP requests to the CGI endpoint containing command-like payloads or shell indicators.
  • Sudden spikes in device CPU/memory or abnormal process activity around web CGI processes.
  • Unexpected outbound connections or DNS queries originating from the device.
  • Logs showing failed or unusual command executions, or new admin sessions.
  • Anomalous configuration changes or renewed administrative access outside normal maintenance windows.

Mitigation and prioritisation

  • Patch to vendor-supplied firmware once available; verify and apply at earliest opportunity.
  • Disable or tightly restrict remote/WAN access to the web administration interface; enforce IP allowlists.
  • Place the device behind a firewall with strict egress/ingress rules; segment from sensitive assets.
  • Monitor for indicators of compromise: command execution attempts, unexpected processes, or sudden config changes; enable enhanced logging.
  • Prepare change-management plan: test patch in lab, schedule a maintenance window, notify affected users.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.