First published: Fri Mar 07 2025(Updated: )
A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink EX1800T | ||
All of | ||
Totolink EX1800T | =9.1.0cu.2112_b20220316 | |
Totolink EX1800T |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2094 has been rated as critical due to its potential for os command injection.
To fix CVE-2025-2094, you should update to the latest firmware version provided by TOTOLINK that addresses this vulnerability.
CVE-2025-2094 affects the TOTOLINK EX1800T router.
CVE-2025-2094 is an os command injection vulnerability.
An attacker can exploit CVE-2025-2094 by manipulating the apcliKey/key argument in the setWiFiExtenderConfig function.