Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover

Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover

Posted on January 6, 2026January 6, 2026 By CWS

Jan 06, 2026Ravie LakshmananIoT Safety / Vulnerability
The CERT Coordination Middle (CERT/CC) has disclosed particulars of an unpatched safety flaw impacting TOTOLINK EX200 wi-fi vary extender that would permit a distant authenticated attacker to achieve full management of the system.
The flaw, CVE-2025-65606 (CVSS rating: N/A), has been characterised as a flaw within the firmware-upload error-handling logic, which may trigger the system to inadvertently begin an unauthenticated root-level telnet service. CERT/CC credited Leandro Kogan for locating and reporting the difficulty.
“An authenticated attacker can set off an error situation within the firmware-upload handler that causes the system to start out an unauthenticated root telnet service, granting full system entry,” CERT/CC mentioned.
Profitable exploitation of the flaw requires an attacker to be already authenticated to the net administration interface to entry the firmware-upload performance.

CERT/CC mentioned the firmware-upload handler enters an “irregular error state” when sure malformed firmware information are processed, inflicting the system to launch a telnet service with root privileges and with out requiring any authentication.
This unintended distant administration interface may very well be exploited by the attacker to hijack inclined gadgets, resulting in configuration manipulation, arbitrary command execution, or persistence.
In response to CERT/CC, TOTOLINK has not launched any patches to handle the flaw, and the product is alleged to be now not actively maintained. TOTOLINK’s net web page for EX200 reveals that the firmware for the product was final up to date in February 2023.
Within the absence of a repair, customers of the equipment are suggested to limit administrative entry to trusted networks, forestall unauthorized customers from accessing the administration interface, monitor for anomalous exercise, and improve to a supported mannequin.

The Hacker News Tags:Device, EX200, Exposes, Firmware, Flaw, Full, Remote, Takeover, TOTOLINK, Unpatched

Post navigation

Previous Post: Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks
Next Post: Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server

Related Posts

GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News
Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety The Hacker News
The Impact of Robotic Process Automation (RPA) on Identity and Access Management The Impact of Robotic Process Automation (RPA) on Identity and Access Management The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News