Unpatched Firmware Flaw Exposes TOTOLINK EX200 Routers to Remote Takeover

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

An unpatched firmware flaw in TOTOLINK EX200 routers allows full remote device takeover. Security researchers at Rapid7 reported that attackers can exploit a hard-coded backdoor account via TCP port 32764. Successful exploitation grants administrative privileges, enabling network traffic interception, malware deployment, and configuration changes. No user interaction is required for remote exploitation, affecting routers in homes, small businesses, and remote offices. The vulnerability is present in multiple firmware versions, with patch availability delayed as of January 2026.

Who is affected

TOTOLINK EX200 router users, including small businesses and home networks, face direct risk of unauthorized access and lateral compromise.

Why CISOs should care

Compromised network devices threaten enterprise connectivity, data confidentiality, and supply chain integrity, particularly when remote offices use vulnerable routers.

3 practical actions

Apply firmware updates: Upgrade TOTOLINK EX200 devices to patched versions immediately.

Isolate vulnerable devices: Segment unpatched routers from critical networks until patched.

Monitor network traffic: Detect anomalies such as unexpected remote logins or configuration changes.