Количество 3
Количество 3
CVE-2025-4269
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
GHSA-p9pq-9xhx-6pgq
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
BDU:2025-05387
Уязвимость сценария cstecgi.cgi (/cgi-bin/cstecgi.cgi) микропрограммного обеспечения роутеров TOTOLINK A720R, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-4269 A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 6.5 | 0% Низкий | 9 месяцев назад | |
GHSA-p9pq-9xhx-6pgq A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 6.5 | 0% Низкий | 9 месяцев назад | |
BDU:2025-05387 Уязвимость сценария cstecgi.cgi (/cgi-bin/cstecgi.cgi) микропрограммного обеспечения роутеров TOTOLINK A720R, позволяющая нарушителю повысить свои привилегии | CVSS3: 6.5 | 0% Низкий | 10 месяцев назад |
Уязвимостей на страницу