Command Injection Vulnerability in TOTOLINK T6 Product
CVE-2025-7613
Key Information:
Badges
What is CVE-2025-7613?
A command injection vulnerability exists in the TOTOLINK T6 router's HTTP POST Request Handler, specifically within the CloudSrvVersionCheck function. An unauthorized attacker can exploit this vulnerability by manipulating the 'ip' argument in the /cgi-bin/cstecgi.cgi file. This allows for arbitrary commands to be executed on the device remotely, potentially compromising its integrity and security. Given that this vulnerability has been publicly disclosed, immediate mitigation measures are highly recommended to protect against possible attacks.
Affected Version(s)
T6 4.1.5cu.748
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved