Логотип exploitDog
bind:CVE-2025-7524
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-7524

Количество 3

Количество 3

nvd логотип

CVE-2025-7524

7 месяцев назад

A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-qf5m-3vrf-gwx9

7 месяцев назад

A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-08498

7 месяцев назад

Уязвимость функции setDiagnosisCfg() сценария cstecgi.cgi микропрограммного обеспечения mesh-системы TOTOLink T6, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-7524

A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
1%
Низкий
7 месяцев назад
github логотип
GHSA-qf5m-3vrf-gwx9

A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
1%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-08498

Уязвимость функции setDiagnosisCfg() сценария cstecgi.cgi микропрограммного обеспечения mesh-системы TOTOLink T6, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.3
1%
Низкий
7 месяцев назад

Уязвимостей на страницу