CVE-2025-2094Command Injection in Ex1800t

Severity
5.3MEDIUMNVD
EPSS
16.6%
top 5.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 7
Latest updateMay 8

Description

A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/ex1800t9.1.0cu.2112_B20220316
NVDtotolink/ex1800t_firmware9.1.0cu.2112_b20220316

🔴Vulnerability Details

2
GHSA
GHSA-3gjw-gxfc-mqhv: A vulnerability was found in TOTOLINK EX1800T 92025-03-08
CVEList
TOTOLINK EX1800T cstecgi.cgi setWiFiExtenderConfig os command injection2025-03-07

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink EX1800T setWiFiExtenderConfig apcliKey/key command injection attempt (CVE-2025-2094)2025-05-08
CVE-2025-2094 — Command Injection in Totolink Ex1800t | cvebase