TOTOLINK A720R 4.1.5cu.374 Config /cgi-bin/cstecgi.cgi topicurl Bayani fitowa

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin TOTOLINK A720R 4.1.5cu.374. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /cgi-bin/cstecgi.cgi na cikin fayil, Config Handler na cikin sashi. Ngam manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg shi Bayani fitowa. CWE shidin ka a yi bayani matsala sai ya kai CWE-200. Gaskiya, laifi an fitar da shi 05/04/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-4270. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.

2 Goyarwa · 87 Datenpunkte

FurɗeSúgá
05/04/2025 20:30
Gargadi 1/1
05/05/2025 10:32
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore5.55.5
advisory_date1746309600 (05/04/2025)1746309600 (05/04/2025)
price_0day$0-$5k$0-$5k
software_vendorTOTOLINKTOTOLINK
software_nameA720RA720R
software_version4.1.5cu.3744.1.5cu.374
software_componentConfig HandlerConfig Handler
software_file/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi
software_argumenttopicurltopicurl
input_valuegetInitCfg/getSysStatusCfggetInitCfg/getSysStatusCfg
vulnerability_cweCWE-200 (Bayani fitowa)CWE-200 (Bayani fitowa)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iNN
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getInitCfg.mdhttps://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getInitCfg.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getSysStatusCfg.mdhttps://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getSysStatusCfg.md
source_cveCVE-2025-4270CVE-2025-4270
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiNN
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viNN
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore5.05.0
cvss2_vuldb_tempscore4.34.3
cvss3_vuldb_basescore5.35.3
cvss3_vuldb_tempscore4.84.8
cvss3_meta_basescore5.35.3
cvss3_meta_tempscore4.85.0
cve_nvd_summaryA vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Config Handler. The manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viN
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore6.9
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cvss3_cna_basescore5.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore5

Interested in the pricing of exploits?

See the underground prices here!