Metrics
Affected Vendors & Products
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Jun 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | TOTOLINK T10 POST Request cstecgi.cgi setWiFiAclRules buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-09T23:31:07.307Z
Updated: 2025-06-10T15:28:00.122Z
Reserved: 2025-06-09T07:58:47.023Z
Link: CVE-2025-5903

Updated: 2025-06-10T14:20:04.219Z

Status : Awaiting Analysis
Published: 2025-06-10T00:15:22.243
Modified: 2025-06-12T16:06:39.330
Link: CVE-2025-5903

No data.