CVE-2025-5903

| EUVD-2025-17612 HIGH
2025-06-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17612
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
PoC Detected
Jun 16, 2025 - 14:29 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 00:15 nvd
HIGH 8.8

Description

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the setWiFiAclRules function in the POST request handler (/cgi-bin/cstecgi.cgi). An authenticated attacker can remotely exploit this vulnerability by manipulating the 'desc' parameter to achieve code execution with full system compromise (confidentiality, integrity, and availability impact). A public proof-of-concept exists, elevating real-world exploitation risk despite requiring low-privilege authentication.

Technical Context

The vulnerability exists in the TOTOLINK T10 wireless router's web management interface, specifically in the cstecgi.cgi CGI script that handles WiFi access control list (ACL) configuration via HTTP POST requests. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition where user-supplied input in the 'desc' parameter is not properly validated for length before being written to a fixed-size stack or heap buffer. The setWiFiAclRules function fails to implement bounds checking, allowing an attacker to overflow the buffer and overwrite adjacent memory structures, potentially leading to arbitrary code execution. This is a memory safety issue fundamental to C/C++ implementations lacking input sanitization on network-facing CGI handlers.

Affected Products

TOTOLIK T10 firmware version 4.1.8cu.5207. The vulnerable component is /cgi-bin/cstecgi.cgi (POST Request Handler). Inferred CPE: cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*. Related CPE pattern: cpe:2.3:h:totolink:t10:*:*:*:*:*:*:*:*. Firmware versions prior to and including 4.1.8cu.5207 are presumed vulnerable; later versions require confirmation from TOTOLINK vendor advisories. The T10 is a consumer/SOHO wireless router, affecting potentially thousands of end-user and small business networks.

Remediation

Immediate actions: (1) TOTOLINK users should check for firmware updates beyond version 4.1.8cu.5207 via the device web interface (System Settings > Firmware Upgrade) or TOTOLINK support portal; apply patches immediately upon availability; (2) Temporary mitigation: restrict access to the router's web management interface (typically port 80/443) to trusted IP addresses only via firewall rules or disable remote administration if not required; change default credentials to strong, unique passwords; (3) Monitor for suspicious POST requests to /cgi-bin/cstecgi.cgi with setWiFiAclRules parameters; (4) Consider replacing the device with a vendor that maintains active security updates if TOTOLINK does not release a patched firmware version promptly; (5) Check TOTOLINK's official security advisory page and CVE/NVD references for patched firmware version numbers when available. Vendor advisory URL: https://www.totolink.net/ (check security/support section).

Priority Score

65
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +44
POC: +20

Share

CVE-2025-5903 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy