Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,直接写文章描述,不需要特定的开头。 首先,我快速浏览文章内容。文章主要讲的是TOTOLINK EX200无线扩展器的一个未修补的安全漏洞。漏洞编号是CVE-2025-65606,CVSS评分未提供。这个漏洞存在于固件上传错误处理逻辑中,可能导致设备启动一个无需身份验证的root级别telnet服务。 接下来,关键点包括:攻击者需要先认证才能触发漏洞,设备进入异常状态后会开启telnet服务,从而获得完全控制权。厂商TOTOLINK没有发布补丁,产品也不再维护。建议用户限制管理访问,监控异常活动,并升级设备。 现在,我需要将这些信息浓缩到100字以内。要确保涵盖主要点:设备型号、漏洞类型、攻击条件、影响以及厂商的应对措施和建议。 可能的结构是:TOTOLINK EX200存在未修补漏洞,允许认证攻击者通过固件上传错误启动telnet服务,获得完全控制权。厂商未修复且不再维护设备,建议用户限制访问并升级。 检查字数是否在限制内,并确保语言简洁明了。 </think> TOTOLINK EX200无线扩展器存在未修补安全漏洞(CVE-2025-65606),允许认证攻击者通过固件上传错误触发root级telnet服务,获取设备完全控制权。该设备已停止维护,厂商未发布补丁。建议用户限制管理访问并升级设备以降低风险。 2026-1-6 15:47:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

IoT Security / Vulnerability

The CERT Coordination Center (CERT/CC) has disclosed details of an unpatched security flaw impacting TOTOLINK EX200 wireless range extender that could allow a remote authenticated attacker to gain full control of the device.

The flaw, CVE-2025-65606 (CVSS score: N/A), has been characterized as a flaw in the firmware-upload error-handling logic, which could cause the device to inadvertently start an unauthenticated root-level telnet service. CERT/CC credited Leandro Kogan for discovering and reporting the issue.

"An authenticated attacker can trigger an error condition in the firmware-upload handler that causes the device to start an unauthenticated root telnet service, granting full system access," CERT/CC said.

Successful exploitation of the flaw requires an attacker to be already authenticated to the web management interface to access the firmware-upload functionality.

Cybersecurity

CERT/CC said the firmware-upload handler enters an "abnormal error state" when certain malformed firmware files are processed, causing the device to launch a telnet service with root privileges and without requiring any authentication.

This unintended remote administration interface could be exploited by the attacker to hijack susceptible devices, leading to configuration manipulation, arbitrary command execution, or persistence.

According to CERT/CC, TOTOLINK has not released any patches to address the flaw, and the product is said to be no longer actively maintained. TOTOLINK's web page for EX200 shows that the firmware for the product was last updated in February 2023.

In the absence of a fix, users of the appliance are advised to restrict administrative access to trusted networks, prevent unauthorized users from accessing the management interface, monitor for anomalous activity, and upgrade to a supported model.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/unpatched-firmware-flaw-exposes.html
如有侵权请联系:admin#unsafe.sh