Overview
CVE-2025-28137 is a critical vulnerability discovered in the TOTOLINK A810R V4.1.2cu.5182_B20201026, a popular wireless router model. The device was found to contain a pre-authentication remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The implications of this vulnerability are severe as it allows an attacker to execute arbitrary commands on a vulnerable device without requiring any form of authentication. This vulnerability has been rated as critical due to its high impact on confidentiality, integrity, and availability.
Vulnerability Summary
CVE ID: CVE-2025-28137
Severity: Critical (9.8 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Potential system compromise and data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
TOTOLINK A810R | V4.1.2cu.5182_B20201026
How the Exploit Works
This vulnerability resides in the setNoticeCfg function of the TOTOLINK A810R firmware, specifically within the NoticeUrl parameter. An attacker can exploit this vulnerability by sending a specially crafted request containing malicious commands to this function. The router firmware fails to adequately sanitize the input to this function, which allows the attacker’s commands to be executed with root privileges on the device.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited. This is a simple HTTP request where the attacker injects malicious commands into the NoticeUrl parameter.
POST /setNoticeCfg HTTP/1.1
Host: <Router_IP_Address>
Content-Type: application/x-www-form-urlencoded
NoticeUrl=; <malicious_command>;
In this example, replace `
Mitigation
The best mitigation strategy for this vulnerability is to apply the vendor’s patch. It is also highly recommended to implement a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as temporary mitigation until the patch can be applied. Regularly update and patch your systems to avoid falling victim to such vulnerabilities.