TOTOLINK EX200 Extender Vulnerability Allow Attacker to Gain Full System Access

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A severe vulnerability in the TOTOLINK EX200 Wi-Fi extender could allow attackers to gain full system access via an unauthenticated telnet root service, researchers warned.

The flaw, tracked as CVE-2025-65606 and assigned CERT Vulnerability Note VU#295169, affects the firmware upload error-handling logic in the End-of-Life TOTOLINK EX200 extender.

When processing malformed firmware files, the device inadvertently enables a root-level telnet service with no authentication.

The vulnerability requires attackers first to gain authenticated access to the device’s web management interface. Once authenticated, attackers can upload malformed firmware files to trigger the error condition.

This activates an unauthenticated telnet service with root privileges, bypassing all security controls.

The telnet interface is usually disabled and not intended for external access, making it an unintended remote administration channel.

Successful exploitation grants complete device control, enabling attackers to execute arbitrary commands and establish persistent network access. A compromised TOTOLINK EX200 could serve as a network entry point.

Attackers may manipulate device configurations, execute unauthorized commands, or maintain long-term network presence. Given the extender’s network position, this vulnerability poses significant risks to connected systems.

According to CERT/CC, TOTOLINK has not released firmware patches, and the EX200 is no longer maintained. Until replacement, organizations should implement these controls:

Restrict management interface access to trusted networks. Implement strong administrative credentials.

Monitor for suspicious telnet activity. Isolate vulnerable devices on separate network segments. Plan immediate device replacement. Owners of TOTOLINK EX200 extenders face an unpatched security risk with no vendor support.

While exploitation requires initial authentication, the subsequent grant of full system access makes this a critical threat that requires urgent remediation through hardware replacement.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post TOTOLINK EX200 Extender Vulnerability Allow Attacker to Gain Full System Access appeared first on Cyber Security News.