ID

VAR-202507-0155


CVE

CVE-2025-7154


TITLE

TOTOLINK  of  N200RE  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-009131

DESCRIPTION

A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of N200RE The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N200RE is a SOHO wireless router that utilizes 11N wireless technology, achieving a maximum wireless transmission rate of 300Mbps. It supports MIMO architecture and ATCT (Automatic Channel Detection) technology, effectively improving wireless performance and stability. The TOTOLINK N200RE suffers from a command injection vulnerability caused by the failure of the Hostname parameter in the /cgi-bin/cstecgi.cgi file to properly sanitize special characters and commands in constructed commands. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2025-7154 // JVNDB: JVNDB-2025-009131 // CNVD: CNVD-2025-18925

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-18925

AFFECTED PRODUCTS

vendor:totolinkmodel:n200rescope:eqversion:9.3.5u.6139_b20201216

Trust: 1.0

vendor:totolinkmodel:n200rescope:eqversion:9.3.5u.6095_b20200916

Trust: 1.0

vendor:totolinkmodel:n200rescope: - version: -

Trust: 0.8

vendor:totolinkmodel:n200rescope:eqversion:n200re firmware 9.3.5u.6095 b20200916

Trust: 0.8

vendor:totolinkmodel:n200rescope:eqversion:n200re firmware 9.3.5u.6139 b20201216

Trust: 0.8

vendor:totolinkmodel:n200rescope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:n200re 9.3.5u.6139 b20201216scope: - version: -

Trust: 0.6

vendor:totolinkmodel:n200re 9.3.5u.6095 b20200916scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-18925 // JVNDB: JVNDB-2025-009131 // NVD: CVE-2025-7154

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-7154
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2025-7154
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-009131
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-18925
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-7154
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-009131
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-18925
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-7154
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-7154
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-009131
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-18925 // JVNDB: JVNDB-2025-009131 // NVD: CVE-2025-7154 // NVD: CVE-2025-7154

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-009131 // NVD: CVE-2025-7154

PATCH

title:Patch for TOTOLINK N200RE command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/721126

Trust: 0.6

sources: CNVD: CNVD-2025-18925

EXTERNAL IDS

db:NVDid:CVE-2025-7154

Trust: 3.2

db:VULDBid:315092

Trust: 1.8

db:JVNDBid:JVNDB-2025-009131

Trust: 0.8

db:CNVDid:CNVD-2025-18925

Trust: 0.6

sources: CNVD: CNVD-2025-18925 // JVNDB: JVNDB-2025-009131 // NVD: CVE-2025-7154

REFERENCES

url:https://github.com/fly200503/iot-vul/blob/master/totolink/n200re/readme.md

Trust: 1.8

url:https://vuldb.com/?id.315092

Trust: 1.8

url:https://vuldb.com/?submit.606230

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-7154

Trust: 1.4

url:https://vuldb.com/?ctiid.315092

Trust: 1.0

sources: CNVD: CNVD-2025-18925 // JVNDB: JVNDB-2025-009131 // NVD: CVE-2025-7154

SOURCES

db:CNVDid:CNVD-2025-18925
db:JVNDBid:JVNDB-2025-009131
db:NVDid:CVE-2025-7154

LAST UPDATE DATE

2025-08-21T23:18:17.243000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-18925date:2025-08-20T00:00:00
db:JVNDBid:JVNDB-2025-009131date:2025-07-17T05:11:00
db:NVDid:CVE-2025-7154date:2025-07-16T19:35:06.347

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-18925date:2025-08-20T00:00:00
db:JVNDBid:JVNDB-2025-009131date:2025-07-17T00:00:00
db:NVDid:CVE-2025-7154date:2025-07-08T01:15:26.200