Cyber Posture

CVE-2025-28138

CriticalPublic PoCRCE

Published: 27 March 2025

Published
27 March 2025
Modified
15 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0379 88.1th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-28138 is a critical-severity OS Command Injection (CWE-78) vulnerability in Totolink A800R Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 11.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating and sanitizing the NoticeUrl parameter in the setNoticeCfg function.

prevent

Requires timely remediation of the specific pre-auth RCE flaw in the router firmware to eliminate the vulnerability.

prevent

Enforces boundary protections to restrict network access to the vulnerable web management interface on the router.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Pre-auth RCE via OS command injection in public-facing router web interface directly enables T1190 for initial access and T1059.004 for Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The TOTOLINK A800R V4.1.2cu.5137_B20200730 were found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter.

Deeper analysisAI

CVE-2025-28138 is a pre-authentication remote command execution vulnerability affecting the TOTOLINK A800R router running firmware version V4.1.2cu.5137_B20200730. The flaw resides in the setNoticeCfg function, where the NoticeUrl parameter allows attackers to inject and execute arbitrary operating system commands, corresponding to CWE-78 (OS Command Injection). The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical severity due to network accessibility and lack of prerequisites for exploitation.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants attackers the ability to execute arbitrary commands on the device, potentially achieving full compromise with high impacts on confidentiality, integrity, and availability, such as data theft, persistent access, or device disruption.

Details on exploitation, including proof-of-concepts, are documented in advisories available at https://github.com/Zerone0x00/CVE/blob/main/TOTOLINK/CVE-2025-28138.md and https://sudsy-eyeliner-a59.notion.site/RCE2-1ac72b8cd95f8055a76ee0ca262aac1a?pvs=4. No specific patch or mitigation guidance is detailed in the provided CVE information.

Details

CWE(s)

Affected Products

totolink
a800r firmware
4.1.2cu.5137_b20200730

CVEs Like This One

CVE-2024-57022Same vendor: Totolink
CVE-2024-57015Same vendor: Totolink
CVE-2024-57011Same vendor: Totolink
CVE-2024-57021Same vendor: Totolink
CVE-2024-57014Same vendor: Totolink
CVE-2024-57018Same vendor: Totolink
CVE-2024-57012Same vendor: Totolink
CVE-2024-57013Same vendor: Totolink
CVE-2024-57020Same vendor: Totolink
CVE-2024-57016Same vendor: Totolink

References