TOTOLINK A3300R 17.0.0cu.557_B20221024 POST Parameter /cgi-bin/cstecgi.cg setOpModeCfg opmode Pufferüberlauf
Gaskiya vulnerability da aka ware a matsayin kura an samu a TOTOLINK A3300R 17.0.0cu.557_B20221024. Hakika, aikin setOpModeCfg ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /cgi-bin/cstecgi.cg, a cikin sashen POST Parameter Handler. A sa manipulation of the argument opmode ka Pufferüberlauf. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-121. Hakika, rauni an bayyana shi 10/26/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-12258. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Babu exploit ɗin da ake samu. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
2 Goyarwa · 84 Datenpunkte
| Furɗe | Súgá 10/26/2025 06:42 | Gargadi 1/1 10/27/2025 12:26 |
|---|---|---|
| software_vendor | TOTOLINK | TOTOLINK |
| software_name | A3300R | A3300R |
| software_version | 17.0.0cu.557_B20221024 | 17.0.0cu.557_B20221024 |
| software_component | POST Parameter Handler | POST Parameter Handler |
| software_file | /cgi-bin/cstecgi.cg | /cgi-bin/cstecgi.cg |
| software_function | setOpModeCfg | setOpModeCfg |
| software_argument | opmode | opmode |
| vulnerability_cwe | CWE-121 (Pufferüberlauf) | CWE-121 (Pufferüberlauf) |
| vulnerability_risk | 2 | 2 |
| cvss3_vuldb_av | N | N |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | H | H |
| cvss3_vuldb_i | H | H |
| cvss3_vuldb_a | H | H |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3300R/setOpModeCfg.md | https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3300R/setOpModeCfg.md |
| source_cve | CVE-2025-12258 | CVE-2025-12258 |
| cna_responsible | VulDB | VulDB |
| cvss2_vuldb_av | N | N |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_ci | C | C |
| cvss2_vuldb_ii | C | C |
| cvss2_vuldb_ai | C | C |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | N | N |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | H | H |
| cvss4_vuldb_vi | H | H |
| cvss4_vuldb_va | H | H |
| cvss2_vuldb_au | S | S |
| cvss2_vuldb_e | ND | ND |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_pr | L | L |
| cvss3_vuldb_e | X | X |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_pr | L | L |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss4_vuldb_e | X | X |
| cvss2_vuldb_basescore | 9.0 | 9.0 |
| cvss2_vuldb_tempscore | 8.6 | 8.6 |
| cvss3_vuldb_basescore | 8.8 | 8.8 |
| cvss3_vuldb_tempscore | 8.5 | 8.5 |
| cvss3_meta_basescore | 8.8 | 8.8 |
| cvss3_meta_tempscore | 8.5 | 8.6 |
| cvss4_vuldb_bscore | 8.7 | 8.7 |
| cvss4_vuldb_btscore | 8.7 | 8.7 |
| advisory_date | 1761429600 (10/26/2025) | 1761429600 (10/26/2025) |
| price_0day | $0-$5k | $0-$5k |
| cve_nvd_summary | A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. Impacted is the function setOpModeCfg of the file /cgi-bin/cstecgi.cg of the component POST Parameter Handler. The manipulation of the argument opmode results in stack-based buffer overflow. The attack may be performed from remote. | |
| cvss4_cna_av | N | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | L | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | H | |
| cvss4_cna_vi | H | |
| cvss4_cna_va | H | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 8.7 | |
| cvss3_cna_av | N | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | L | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | H | |
| cvss3_cna_i | H | |
| cvss3_cna_a | H | |
| cvss3_cna_basescore | 8.8 | |
| cvss2_cna_av | N | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | S | |
| cvss2_cna_ci | C | |
| cvss2_cna_ii | C | |
| cvss2_cna_ai | C | |
| cvss2_cna_basescore | 9 |