Command Injection Vulnerability in TOTOLINK T6 HTTP POST Handler
CVE-2025-7524
Key Information:
Badges
What is CVE-2025-7524?
A command injection vulnerability has been identified in the TOTOLINK T6, specifically within the HTTP POST Request Handler function setDiagnosisCfg located in /cgi-bin/cstecgi.cgi. This flaw is triggered by manipulating the 'ip' argument, allowing an attacker to execute arbitrary commands remotely. Given that this vulnerability can be exploited remotely, it poses a significant risk, particularly because the details regarding its exploitation have already been disclosed publicly. Stakeholders using affected versions should take immediate action to mitigate the risks.
Affected Version(s)
T6 4.1.5cu.748_B20211015
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved