Metrics
Affected Vendors & Products
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
Title | TOTOLINK T10 POST Request cstecgi.cgi setWiFiRepeaterCfg buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-10T00:00:18.830Z
Updated: 2025-06-10T15:27:25.647Z
Reserved: 2025-06-09T07:58:52.652Z
Link: CVE-2025-5905

Updated: 2025-06-10T14:19:27.975Z

Status : Awaiting Analysis
Published: 2025-06-10T00:15:22.653
Modified: 2025-06-12T16:06:39.330
Link: CVE-2025-5905

No data.