Metrics
Affected Vendors & Products
Mon, 16 Jun 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Totolink
Totolink t10 Totolink t10 Firmware |
|
CPEs | cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:* |
|
Vendors & Products |
Totolink
Totolink t10 Totolink t10 Firmware |
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
Title | TOTOLINK T10 POST Request cstecgi.cgi setWiFiRepeaterCfg buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-10T00:00:18.830Z
Updated: 2025-06-10T15:27:25.647Z
Reserved: 2025-06-09T07:58:52.652Z
Link: CVE-2025-5905

Updated: 2025-06-10T14:19:27.975Z

Status : Analyzed
Published: 2025-06-10T00:15:22.653
Modified: 2025-06-16T14:21:25.860
Link: CVE-2025-5905

No data.