Article Details

Scrape Timestamp (UTC): 2026-01-06 15:50:23.989

Source: https://thehackernews.com/2026/01/unpatched-firmware-flaw-exposes.html

Original Article Text

Click to Toggle View

Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover. The CERT Coordination Center (CERT/CC) has disclosed details of an unpatched security flaw impacting TOTOLINK EX200 wireless range extender that could allow a remote authenticated attacker to gain full control of the device. The flaw, CVE-2025-65606 (CVSS score: N/A), has been characterized as a flaw in the firmware-upload error-handling logic, which could cause the device to inadvertently start an unauthenticated root-level telnet service. CERT/CC credited Leandro Kogan for discovering and reporting the issue. "An authenticated attacker can trigger an error condition in the firmware-upload handler that causes the device to start an unauthenticated root telnet service, granting full system access," CERT/CC said. Successful exploitation of the flaw requires an attacker to be already authenticated to the web management interface to access the firmware-upload functionality. CERT/CC said the firmware-upload handler enters an "abnormal error state" when certain malformed firmware files are processed, causing the device to launch a telnet service with root privileges and without requiring any authentication. This unintended remote administration interface could be exploited by the attacker to hijack susceptible devices, leading to configuration manipulation, arbitrary command execution, or persistence. According to CERT/CC, TOTOLINK has not released any patches to address the flaw, and the product is said to be no longer actively maintained. TOTOLINK's web page for EX200 shows that the firmware for the product was last updated in February 2023. In the absence of a fix, users of the appliance are advised to restrict administrative access to trusted networks, prevent unauthorized users from accessing the management interface, monitor for anomalous activity, and upgrade to a supported model.

Daily Brief Summary

VULNERABILITIES // Unpatched Firmware Flaw in TOTOLINK EX200 Allows Remote Takeover

CERT Coordination Center disclosed a critical flaw in TOTOLINK EX200, enabling remote attackers to gain full control of the device through an unauthenticated root-level telnet service.

The vulnerability, identified as CVE-2025-65606, stems from firmware-upload error-handling logic, inadvertently starting a telnet service that grants attackers root access.

Exploitation requires prior authentication to the device's web management interface, where malformed firmware files trigger the vulnerability.

TOTOLINK has not released a patch for this flaw, and the EX200 model is no longer actively maintained, with the last firmware update in February 2023.

Users are advised to restrict administrative access to trusted networks and monitor for unusual activities to mitigate potential exploitation risks.

The lack of ongoing support for the EX200 highlights the importance of upgrading to supported models to ensure device security.

This incident emphasizes the critical need for timely patch management and proactive vulnerability assessments in network devices.