TOTOLINK A720R 4.1.5cu.374 Config /cgi-bin/cstecgi.cgi topicurl Bayani fitowa
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin TOTOLINK A720R 4.1.5cu.374. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /cgi-bin/cstecgi.cgi na cikin fayil, Config Handler na cikin sashi. Ngam manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg shi Bayani fitowa. CWE shidin ka a yi bayani matsala sai ya kai CWE-200. Gaskiya, laifi an fitar da shi 05/04/2025. Advisory ɗin ana rabawa don saukewa a github.com.
Wannan rauni ana sayar da shi da suna CVE-2025-4270. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.
Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
2 Goyarwa · 87 Datenpunkte
| Furɗe | Súgá 05/04/2025 20:30 | Gargadi 1/1 05/05/2025 10:32 |
|---|---|---|
| cvss4_vuldb_bscore | 6.9 | 6.9 |
| cvss4_vuldb_btscore | 5.5 | 5.5 |
| advisory_date | 1746309600 (05/04/2025) | 1746309600 (05/04/2025) |
| price_0day | $0-$5k | $0-$5k |
| software_vendor | TOTOLINK | TOTOLINK |
| software_name | A720R | A720R |
| software_version | 4.1.5cu.374 | 4.1.5cu.374 |
| software_component | Config Handler | Config Handler |
| software_file | /cgi-bin/cstecgi.cgi | /cgi-bin/cstecgi.cgi |
| software_argument | topicurl | topicurl |
| input_value | getInitCfg/getSysStatusCfg | getInitCfg/getSysStatusCfg |
| vulnerability_cwe | CWE-200 (Bayani fitowa) | CWE-200 (Bayani fitowa) |
| vulnerability_risk | 1 | 1 |
| cvss3_vuldb_av | N | N |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_pr | N | N |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | L | L |
| cvss3_vuldb_i | N | N |
| cvss3_vuldb_a | N | N |
| cvss3_vuldb_e | P | P |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getInitCfg.md | https://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getInitCfg.md |
| exploit_availability | 1 | 1 |
| exploit_publicity | 1 | 1 |
| exploit_url | https://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getSysStatusCfg.md | https://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/getSysStatusCfg.md |
| source_cve | CVE-2025-4270 | CVE-2025-4270 |
| cna_responsible | VulDB | VulDB |
| cvss2_vuldb_av | N | N |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_au | N | N |
| cvss2_vuldb_ci | P | P |
| cvss2_vuldb_ii | N | N |
| cvss2_vuldb_ai | N | N |
| cvss2_vuldb_e | POC | POC |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | N | N |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_pr | N | N |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | L | L |
| cvss4_vuldb_vi | N | N |
| cvss4_vuldb_va | N | N |
| cvss4_vuldb_e | P | P |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss2_vuldb_basescore | 5.0 | 5.0 |
| cvss2_vuldb_tempscore | 4.3 | 4.3 |
| cvss3_vuldb_basescore | 5.3 | 5.3 |
| cvss3_vuldb_tempscore | 4.8 | 4.8 |
| cvss3_meta_basescore | 5.3 | 5.3 |
| cvss3_meta_tempscore | 4.8 | 5.0 |
| cve_nvd_summary | A vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Config Handler. The manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| cvss4_cna_av | N | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | N | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | L | |
| cvss4_cna_vi | N | |
| cvss4_cna_va | N | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 6.9 | |
| cvss3_cna_av | N | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | N | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | L | |
| cvss3_cna_i | N | |
| cvss3_cna_a | N | |
| cvss3_cna_basescore | 5.3 | |
| cvss2_cna_av | N | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | N | |
| cvss2_cna_ci | P | |
| cvss2_cna_ii | N | |
| cvss2_cna_ai | N | |
| cvss2_cna_basescore | 5 |