ID

VAR-202503-0266


CVE

CVE-2025-2094


TITLE

TOTOLINK  of  ex1800t  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2025-002975

DESCRIPTION

A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of ex1800t The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a wireless repeater from China's TOTOLINK Electronics. No detailed vulnerability details are currently provided

Trust: 2.16

sources: NVD: CVE-2025-2094 // JVNDB: JVNDB-2025-002975 // CNVD: CNVD-2025-12093

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12093

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1800tscope:eqversion:9.1.0cu.2112_b20220316

Trust: 1.0

vendor:totolinkmodel:ex1800tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion:ex1800t firmware 9.1.0cu.2112 b20220316

Trust: 0.8

vendor:totolinkmodel:ex1800t 9.1.0cu.2112 b20220316scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-12093 // JVNDB: JVNDB-2025-002975 // NVD: CVE-2025-2094

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-2094
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-2094
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-002975
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-12093
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-2094
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-002975
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12093
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-2094
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-2094
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-002975
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12093 // JVNDB: JVNDB-2025-002975 // NVD: CVE-2025-2094 // NVD: CVE-2025-2094

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-002975 // NVD: CVE-2025-2094

EXTERNAL IDS

db:NVDid:CVE-2025-2094

Trust: 3.2

db:VULDBid:298952

Trust: 1.8

db:JVNDBid:JVNDB-2025-002975

Trust: 0.8

db:CNVDid:CNVD-2025-12093

Trust: 0.6

sources: CNVD: CNVD-2025-12093 // JVNDB: JVNDB-2025-002975 // NVD: CVE-2025-2094

REFERENCES

url:https://github.com/kn0sky/cve/blob/main/totolink%20ex1800t/os%20command%20injection%2001%20setwifiextenderconfig-_apclikey.md

Trust: 2.4

url:https://vuldb.com/?id.298952

Trust: 1.8

url:https://vuldb.com/?submit.515319

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.298952

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-2094

Trust: 0.8

sources: CNVD: CNVD-2025-12093 // JVNDB: JVNDB-2025-002975 // NVD: CVE-2025-2094

SOURCES

db:CNVDid:CNVD-2025-12093
db:JVNDBid:JVNDB-2025-002975
db:NVDid:CVE-2025-2094

LAST UPDATE DATE

2025-06-15T23:43:16.045000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12093date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-002975date:2025-04-04T08:47:00
db:NVDid:CVE-2025-2094date:2025-04-03T15:30:18.080

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12093date:2025-06-10T00:00:00
db:JVNDBid:JVNDB-2025-002975date:2025-04-04T00:00:00
db:NVDid:CVE-2025-2094date:2025-03-07T22:15:38.850