search menu icon-carat-right cmu-wordmark

CERT Coordination Center

TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service

Vulnerability Note VU#295169

Original Release Date: 2026-01-06 | Last Revised: 2026-01-06

Overview

A flaw in the firmware-upload error-handling logic of the TOTOLINK EX200 extender can cause the device to unintentionally start an unauthenticated root-level telnet service. This condition may allow a remote authenticated attacker to gain full system access.

Description

In the End-of-Life (EoL) TOTOLINK EX200 firmware, the firmware-upload handler enters an abnormal error state when processing certain malformed firmware files. When this occurs, the device launches a telnet service running with root privileges and does not require authentication. Because the telnet interface is normally disabled and not intended to be exposed, this behavior creates an unintended remote administration interface.

To exploit this vulnerability, an attacker must already be authenticated to the web management interface to access the firmware-upload functionality. Once the error condition is triggered, the resulting unauthenticated telnet service provides full control of the device.

CVE-2025-65606 An authenticated attacker can trigger an error condition in the firmware-upload handler that causes the device to start an unauthenticated root telnet service, granting full system access.

Impact

A remote authenticated attacker may be able to activate a root telnet service and subsequently take complete control of the device. This may lead to configuration manipulation, arbitrary command execution, or establishing a persistent foothold on the network.

Solution

TOTOLINK has not released an update addressing this issue, and the product is no longer maintained. Users should restrict administrative access to trusted networks, prevent untrusted users from accessing the management interface, monitor for unexpected telnet activity, and plan to replace the vulnerable device.

Acknowledgements

Thanks to the reporter Leandro Kogan for bringing this to our attention. This document was written by Timur Snoke.

Vendor Information

295169
 

Toto Link Unknown

Notified:  2025-11-17 Updated: 2026-01-06

CVE-2025-65606 Unknown

Vendor Statement

We have not received a statement from the vendor.


Other Information

CVE IDs: CVE-2025-65606
API URL: VINCE JSON | CSAF
Date Public: 2026-01-06
Date First Published: 2026-01-06
Date Last Updated: 2026-01-06 14:49 UTC
Document Revision: 1

Sponsored by CISA.