• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

TOTOLINK X6000R Routers Hit by Three Vulnerabilities Permitting Distant Code Execution

Admin by Admin
October 2, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Three vital safety flaws have been found in firmware model V9.4.0cu.1360_B20241207 of the TOTOLINK X6000R router launched on March 28, 2025.

These vulnerabilities vary from argument injection and command injection to a safety bypass that may result in distant code execution.

Attackers can crash gadgets, corrupt system recordsdata, and execute arbitrary instructions with out authentication.

Customers should replace instantly to the mounted firmware launch (V9.4.0cu.1498_B20250826) to guard their networks.

Overview of the Vulnerabilities

CVE Identifier Score CVSS-B Rating Description
CVE-2025-52905 Excessive 7.0 Argument injection flaw that may crash the router or overwhelm exterior servers, leading to denial of service.
CVE-2025-52906 Crucial 9.3 Unauthenticated command injection permitting distant execution of arbitrary instructions on the machine.
CVE-2025-52907 Excessive 7.3 Safety bypass enabling arbitrary file writes, persistent denial-of-service, or chainable distant code execution exploits.

Technical Evaluation of Argument Injection – CVE-2025-52905

The firmware’s central net interface endpoint, /cgi-bin/cstecgi.cgi, processes person inputs based mostly on a topicurl parameter.

 Input validation function for user input
 Enter validation perform for person enter

 CVE-2025-52905 stems from an incomplete enter validation perform that blocks harmful characters however omits the hyphen (–).

This oversight permits malicious payloads to bypass filtering. Attackers can ship crafted requests that inject arguments into system calls, crashing the machine or redirecting operations to exterior servers.

Exploitation requires solely community entry to the router’s net UI, making mass scanning and automatic assaults trivial for risk actors.

Unauthenticated Command Injection Influence – CVE-2025-52906

CVE-2025-52906 exists within the setEasyMeshAgentCfg perform, which configures mesh agent settings. The perform fails to sanitize the agentName parameter, enabling unauthenticated attackers to insert shell instructions.

When executed by the net server course of, these instructions run with elevated privileges. A profitable exploit can set up persistent malware, intercept community site visitors, or pivot to different gadgets inside the person’s atmosphere.

This vulnerability represents a vital lapse in enter sanitization and authentication controls.

Safety Bypass Resulting in RCE – CVE-2025-52907

CVE-2025-52907 leverages the identical flawed sanitization logic within the setWizardCfg perform. By crafting inputs that keep away from the blocklist, attackers can carry out arbitrary file writes.

Vulnerable setWizardCfg processing analysis
Susceptible setWizardCfg processing evaluation

Crucial system recordsdata corresponding to /and so forth/passwd will be modified so as to add new accounts, and boot scripts will be altered to ensure distant code execution on restart.

This chainable exploit permits persistent management over the router, undermining any community safety perimeter.

House routers are the gateway to all related gadgets, and these vulnerabilities spotlight the necessity for rigorous enter validation in IoT firmware, as reported by Palo Alto Networks.

Customers of the TOTOLINK X6000R should replace to firmware V9.4.0cu.1498_B20250826 directly.

Sustaining up-to-date firmware and strong community monitoring stays important to guard in opposition to rising IoT threats.

Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and Set GBH as a Most well-liked Supply in Google.

Tags: AllowingCodeExecutionHitRemoteRoutersTOTOLINKVulnerabilitiesX6000R
Admin

Admin

Next Post
Kevin Roose: AI’s Media Gatekeeper

Kevin Roose: AI’s Media Gatekeeper

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Google’s Veo 3.1 Simply Made AI Filmmaking Sound—and Look—Uncomfortably Actual

Google’s Veo 3.1 Simply Made AI Filmmaking Sound—and Look—Uncomfortably Actual

October 16, 2025
Are AI Overviews Value Pursuing?

Are AI Overviews Value Pursuing?

July 9, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Undertaking possession (fairness and fairness)

Freedom of focus | Seth’s Weblog

March 19, 2026
Cease Slouching Over A Laptop computer On Your Desk With This ‘Should-Have’ Amazon Ergonomic Laptop computer Stand

Cease Slouching Over A Laptop computer On Your Desk With This ‘Should-Have’ Amazon Ergonomic Laptop computer Stand

March 19, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved