CVE-2025-5903 PUBLISHED

TOTOLINK T10 POST Request cstecgi.cgi setWiFiAclRules buffer overflow

Assigner: VulDB
Reserved: 09.06.2025 Published: 09.06.2025 Updated: 10.06.2025

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.7

Product Status

Vendor TOTOLINK
Product T10
Versions
  • Version 4.1.8cu.5207 is affected

Credits

  • ysnysnysn (VulDB User) reporter

References

Problem Types

  • Buffer Overflow CWE
  • Memory Corruption CWE