CVE-2025-5903

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*

History

16 Jun 2025, 14:29

Type Values Removed Values Added
CWE CWE-120
CPE cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
First Time Totolink t10 Firmware
Totolink t10
Totolink
References () https://vuldb.com/?submit.592247 - () https://vuldb.com/?submit.592247 - Third Party Advisory, VDB Entry
References () https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiAclRules-20bdf0aa118580399a8df6ba2a44c197 - () https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiAclRules-20bdf0aa118580399a8df6ba2a44c197 - Exploit, Third Party Advisory
References () https://vuldb.com/?id.311676 - () https://vuldb.com/?id.311676 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.311676 - () https://vuldb.com/?ctiid.311676 - Permissions Required, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product

10 Jun 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : unknown
CWE CWE-120
CWE-119

10 Jun 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 00:15

Updated : 2025-06-16 14:29


NVD link : CVE-2025-5903

Mitre link : CVE-2025-5903


JSON object : View

Products Affected

totolink

  • t10_firmware
  • t10
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')