Information Disclosure in TOTOLINK A720R by TOTOLINK
CVE-2025-4271

6.9MEDIUM

Key Information:

Vendor
Totolink
Status
Vendor
CVE Published:
5 May 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability has been identified in the TOTOLINK A720R (version 4.1.5cu.374) that allows unauthorized remote access to sensitive information. Specifically, the issue lies in the '/cgi-bin/cstecgi.cgi' file's handling of the 'topicurl' argument with the input 'showSyslog'. This manipulation can lead to the unintentional exposure of system logs, potentially endangering the security and integrity of the affected systems. As this exploit has been made public, it poses a significant risk for users who have not yet implemented mitigations.

Affected Version(s)

A720R 4.1.5cu.374

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

153528990 (VulDB User)
.
CVE-2025-4271 : Information Disclosure in TOTOLINK A720R by TOTOLINK | SecurityVulnerability.io