Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vulnerability in Totolink Range Extender Allows Device Takeover

Vulnerability in Totolink Range Extender Allows Device Takeover

Posted on January 7, 2026January 7, 2026 By CWS

A safety defect within the discontinued Totolink EX200 wi-fi vary extender may enable attackers to take over weak gadgets, the CERT Coordination Heart (CERT/CC) warns.

Tracked as CVE-2025-65606, the vulnerability impacts the firmware-upload error-handling logic of the community extender.

When processing malformed firmware information, the firmware-upload handler enters an irregular error state, which ends up in the launch of a Telnet service.

The service runs with root privileges and doesn’t require authentication, thus offering full system entry, CERT/CC notes.

“As a result of the telnet interface is often disabled and never meant to be uncovered, this conduct creates an unintended distant administration interface,” CERT/CC’s advisory reads.

Profitable exploitation of the vulnerability, nonetheless, requires authenticated entry to the gadget’s net administration interface, to set off the error within the firmware-upload performance.Commercial. Scroll to proceed studying.

“As soon as the error situation is triggered, the ensuing unauthenticated telnet service gives full management of the gadget,” CERT/CC says.

An attacker in a position to set off the bug positive aspects full management of the gadget, which permits them to change configurations and execute arbitrary instructions to infiltrate the native community.

The weak Totolink EX200 extender is now not maintained, with the final firmware updates launched in 2021 and 2023 (for {hardware} revision 1 and a pair of, respectively).

No patch is on the market for the newly disclosed safety defect, which was reported by Leandro Kogan.

“Customers ought to prohibit administrative entry to trusted networks, stop untrusted customers from accessing the administration interface, monitor for surprising telnet exercise, and plan to interchange the weak gadget,” CERT/CC notes.

Associated: Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’

Associated: Cisco Routers Hacked for Rootkit Deployment

Associated: Unauthenticated RCE Flaw Patched in DrayTek Routers

Associated: Totolink Routers, Different System Exploits Added to Beastmode Botnet

Security Week News Tags:Device, Extender, Range, Takeover, TOTOLINK, Vulnerability

Post navigation

Previous Post: Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
Next Post: PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352

Related Posts

Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations Security Week News
In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy Security Week News
Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform Security Week News
Predator Spyware Turns Failed Attacks Into Intelligence for Future Exploits Predator Spyware Turns Failed Attacks Into Intelligence for Future Exploits Security Week News
Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Security Week News
Veeam to Acquire Data Security Firm Securiti AI for .7 Billion Veeam to Acquire Data Security Firm Securiti AI for $1.7 Billion Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News