Skip to main content

CVE-2025-5903: Buffer Overflow in TOTOLINK T10

High
VulnerabilityCVE-2025-5903cvecve-2025-5903
Published: Mon Jun 09 2025 (06/09/2025, 23:31:07 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: T10

Description

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:16:31 UTC

Technical Analysis

CVE-2025-5903 is a critical buffer overflow vulnerability identified in the TOTOLINK T10 router, specifically affecting version 4.1.8cu.5207. The flaw exists in the POST request handler component, within the setWiFiAclRules function of the /cgi-bin/cstecgi.cgi CGI script. The vulnerability arises from improper handling of the 'desc' argument, which can be manipulated by an attacker to overflow a buffer. This overflow can lead to arbitrary code execution or cause the device to crash, compromising the router's confidentiality, integrity, and availability. The attack vector is remote and does not require user interaction or authentication, making exploitation relatively straightforward. The CVSS 4.0 base score is 8.7, indicating a high severity level with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The vulnerability's impact is significant because routers like the TOTOLINK T10 serve as critical network gateways, and compromise could allow attackers to intercept, modify, or disrupt network traffic, or pivot to internal networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises or home office environments that utilize TOTOLINK T10 routers. Successful exploitation could lead to unauthorized network access, data interception, or disruption of internet connectivity, impacting business operations and data privacy. Given the router's role in managing WiFi access control lists, attackers could manipulate network access policies, potentially allowing unauthorized devices to connect. This could facilitate lateral movement within corporate networks, data exfiltration, or deployment of further malware. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation attempts, which could lead to widespread compromise. Additionally, organizations subject to strict data protection regulations such as GDPR may face compliance risks if sensitive data is exposed due to this vulnerability.

Mitigation Recommendations

Immediate mitigation should focus on isolating affected TOTOLINK T10 devices from untrusted networks and restricting remote management interfaces to trusted IP addresses only. Network administrators should monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected POST requests to /cgi-bin/cstecgi.cgi. Deploying network intrusion detection systems (NIDS) with signatures targeting this vulnerability can help detect exploitation attempts. Since no official patch is currently available, organizations should consider replacing vulnerable devices with updated hardware or firmware versions once released. Additionally, disabling remote management features and enforcing strong network segmentation can limit the attack surface. Regularly auditing router configurations and access control lists will help identify unauthorized changes. Finally, educating users about the risks and encouraging prompt reporting of network anomalies can aid early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-09T07:58:47.023Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f541b0bd07c3938a181

Added to database: 6/10/2025, 6:54:12 PM

Last enriched: 7/11/2025, 12:16:31 AM

Last updated: 8/11/2025, 6:06:54 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats