Cyber Posture

CVE-2025-28138

CriticalPublic PoC

Published: 27 March 2025

Published
27 March 2025
Modified
15 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0788 92.0th percentile
Risk Priority 24 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-28138 is a pre-authentication remote command execution vulnerability affecting the TOTOLINK A800R router running firmware version V4.1.2cu.5137_B20200730. The flaw resides in the setNoticeCfg function, where the NoticeUrl parameter allows attackers to inject and execute arbitrary operating system commands, corresponding to CWE-78 (OS Command Injection). The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical severity due to network accessibility and lack of prerequisites for exploitation.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants attackers the ability to execute arbitrary commands on the device, potentially achieving full compromise with high impacts on confidentiality, integrity, and availability, such as data theft, persistent access, or device disruption.

Details on exploitation, including proof-of-concepts, are documented in advisories available at https://github.com/Zerone0x00/CVE/blob/main/TOTOLINK/CVE-2025-28138.md and https://sudsy-eyeliner-a59.notion.site/RCE2-1ac72b8cd95f8055a76ee0ca262aac1a?pvs=4. No specific patch or mitigation guidance is detailed in the provided CVE information.

Details

CWE(s)
CWE-78

Affected Products

totolink
a800r firmware
4.1.2cu.5137_b20200730

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Pre-auth RCE via OS command injection in public-facing router web interface directly enables T1190 for initial access and T1059.004 for Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References