CERT/CC warns of critical, unfixed vulnerability in TOTOLINK EX200
CERT/CC披露TOTOLINK EX200固件存在严重未修复漏洞(CVE-2025-65606),允许远程认证攻击者通过上传特制固件文件触发异常状态,启动无认证的root权限telnet服务,从而完全控制设备。该设备已停产且厂商未提供补丁。 2026-1-6 20:28:3 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

CERT/CC warns of critical, unfixed vulnerability in TOTOLINK EX200

CERT/CC disclosed an unpatched flaw in the TOTOLINK EX200 that allows a remote authenticated attacker to fully compromise the device.

CERT/CC warns of an unpatched vulnerability, tracked as CVE-2025-65606, in the TOTOLINK EX200 range extender that lets a remote authenticated attacker fully take over the device.

The TOTOLINK EX200 is a compact Wi-Fi range extender designed to boost wireless coverage in homes or small offices. It connects to an existing router and rebroadcasts the signal to eliminate dead zones, supporting basic security features and simple web-based configuration.

A vulnerability in the end-of-life TOTOLINK EX200 firmware allows a serious security bypass during firmware uploads. When the device processes specially crafted, malformed firmware files, an error in the upload handler can trigger an abnormal state that unintentionally starts a telnet service running as root and without authentication.

The researchers pointed out that the exploitation requires prior access to the web management interface, however, once triggered, the exposed telnet service grants full remote control of the device. The telnet interface is normally disabled and not meant to be accessible, making this behavior particularly dangerous. Tracked as CVE-2025-65606, the flaw effectively turns an authenticated web action into complete system takeover. It could allow attackers to change settings, run arbitrary commands, or maintain persistent access to the network.

“In the End-of-Life (EoL) TOTOLINK EX200 firmware, the firmware-upload handler enters an abnormal error state when processing certain malformed firmware files. When this occurs, the device launches a telnet service running with root privileges and does not require authentication.” reads the CERT/CC’s advisory. “Because the telnet interface is normally disabled and not intended to be exposed, this behavior creates an unintended remote administration interface.”

TOTOLINK has not patched the flaw and no longer supports the device, so users should limit admin access, watch for telnet activity, and replace the extender.

The researcher Leandro Kogan reported the vulnerability.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2025-65606)




文章来源: https://securityaffairs.com/186597/security/cert-cc-warns-of-critical-unfixed-vulnerability-in-totolink-ex200.html
如有侵权请联系:admin#unsafe.sh