CVE-2025-7525

A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument command leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t6_firmware:v4.1.5cu.748_b20211015:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t6:3:*:*:*:*:*:*:*

History

15 Jul 2025, 20:15

Type Values Removed Values Added
CWE CWE-77
CWE-74

15 Jul 2025, 18:33

Type Values Removed Values Added
First Time Totolink t6 Firmware
Totolink
Totolink t6
References () https://vuldb.com/?ctiid.316222 - () https://vuldb.com/?ctiid.316222 - Permissions Required
References () https://github.com/ElvisBlue/Public/blob/main/Vuln/3.md#poc - () https://github.com/ElvisBlue/Public/blob/main/Vuln/3.md#poc - Exploit, Third Party Advisory
References () https://github.com/ElvisBlue/Public/blob/main/Vuln/3.md - () https://github.com/ElvisBlue/Public/blob/main/Vuln/3.md - Exploit, Third Party Advisory
References () https://vuldb.com/?submit.612936 - () https://vuldb.com/?submit.612936 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.316222 - () https://vuldb.com/?id.316222 - Third Party Advisory, VDB Entry
References () https://youtu.be/GawLaYfTwYs - () https://youtu.be/GawLaYfTwYs - Exploit
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 8.8
CPE cpe:2.3:o:totolink:t6_firmware:v4.1.5cu.748_b20211015:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t6:3:*:*:*:*:*:*:*

13 Jul 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-13 10:15

Updated : 2025-07-15 20:15


NVD link : CVE-2025-7525

Mitre link : CVE-2025-7525


JSON object : View

Products Affected

totolink

  • t6_firmware
  • t6
CWE

No CWE.