Improper Access Control in TOTOLINK A720R Log Handler
CVE-2025-4269
Key Information:
Badges
Summary
The TOTOLINK A720R is affected by a significant vulnerability in its Log Handler component, specifically in the processing of the /cgi-bin/cstecgi.cgi file. The issue arises from inappropriate handling of input parameters, particularly the topicurl argument. By manipulating this parameter, attackers can gain unauthorized access to sensitive functionalities such as clearDiagnosisLog, clearSyslog, and clearTracerouteLog. This vulnerability allows potential attackers to execute commands and perform actions remotely, posing a serious risk to users and network security.
Affected Version(s)
A720R 4.1.5cu.374
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved