A vulnerability was found in TOTOLINK T10, A3100R, A950RG, A800R, N600R, A3000RU and A810R 4.1.8cu.5241_B20210927. It has been declared as critical. This vulnerability affects the function CloudACMunualUpdate of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 29 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3000ru Firmware
Totolink a3100r Firmware
Totolink a800r Firmware
Totolink a810r Firmware
Totolink a950rg Firmware
Totolink n600r Firmware
Totolink t10 Firmware
CPEs cpe:2.3:h:totolink:a3000ru:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a800r:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a810r:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a950rg:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3000ru_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3100r_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a800r_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a810r_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a950rg_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n600r_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5241_b20210927:*:*:*:*:*:*:*
Vendors & Products Totolink a3000ru Firmware
Totolink a3100r Firmware
Totolink a800r Firmware
Totolink a810r Firmware
Totolink a950rg Firmware
Totolink n600r Firmware
Totolink t10 Firmware

Mon, 12 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 10 May 2025 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in TOTOLINK T10, A3100R, A950RG, A800R, N600R, A3000RU and A810R 4.1.8cu.5241_B20210927. It has been declared as critical. This vulnerability affects the function CloudACMunualUpdate of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK T10/A3100R/A950RG/A800R/N600R/A3000RU/A810R cstecgi.cgi CloudACMunualUpdate buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-05-10T05:00:10.763Z

Updated: 2025-05-12T19:30:55.738Z

Reserved: 2025-05-09T12:33:38.764Z

Link: CVE-2025-4496

cve-icon Vulnrichment

Updated: 2025-05-12T19:30:47.754Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-10T05:15:50.610

Modified: 2025-07-29T14:42:19.960

Link: CVE-2025-4496

cve-icon Redhat

No data.