CVE-2025-5905

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*

History

16 Jun 2025, 14:21

Type Values Removed Values Added
References () https://vuldb.com/?id.311678 - () https://vuldb.com/?id.311678 - Third Party Advisory, VDB Entry
References () https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiRepeaterCfg-20bdf0aa118580bd8cd0da62d4d2e47f?pvs=73 - () https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiRepeaterCfg-20bdf0aa118580bd8cd0da62d4d2e47f?pvs=73 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.311678 - () https://vuldb.com/?ctiid.311678 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.592265 - () https://vuldb.com/?submit.592265 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
CPE cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
CWE CWE-120
First Time Totolink t10 Firmware
Totolink t10
Totolink

10 Jun 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : unknown
CWE CWE-120
CWE-119

10 Jun 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 00:15

Updated : 2025-06-16 14:21


NVD link : CVE-2025-5905

Mitre link : CVE-2025-5905


JSON object : View

Products Affected

totolink

  • t10_firmware
  • t10
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')