A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/FLY200503/IoT-vul/blob/master/Totolink/N200RE/README.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.315092 | Permissions Required VDB Entry |
| https://vuldb.com/?id.315092 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.606230 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
| https://github.com/FLY200503/IoT-vul/blob/master/Totolink/N200RE/README.md | Exploit Third Party Advisory |
Configurations
History
16 Jul 2025, 19:35
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-08 01:15
Updated : 2025-07-16 19:35
NVD link : CVE-2025-7154
Mitre link : CVE-2025-7154
CVE.ORG link : CVE-2025-7154
JSON object : View
Products Affected
totolink
- n200re_firmware
- n200re
