Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60686: n/a

0
Medium
VulnerabilityCVE-2025-60686cvecve-2025-60686
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A local stack-based buffer overflow vulnerability exists in the infostat.cgi and cstecgi.cgi binaries of ToToLink routers (A720R V4.1.5cu.614_B20230630, LR1200GB V9.1.0u.6619_B20230130, and NR1800X V9.1.0u.6681_B20230703). Both programs parse the contents of /proc/net/arp using sscanf() with "%s" format specifiers into fixed-size stack buffers without length validation. Specifically, one function writes user-controlled data into a single-byte buffer, and the other into adjacent small arrays without bounds checking. An attacker who controls the contents of /proc/net/arp can trigger memory corruption, leading to denial of service or potential arbitrary code execution.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:05:33 UTC

Technical Analysis

CVE-2025-60686 is a stack-based buffer overflow vulnerability found in two CGI binaries—infostat.cgi and cstecgi.cgi—on certain ToToLink router models (A720R V4.1.5cu.614_B20230630, LR1200GB V9.1.0u.6619_B20230130, NR1800X V9.1.0u.6681_B20230703). Both binaries parse the contents of the /proc/net/arp file using the unsafe sscanf() function with "%s" format specifiers, which do not enforce length limits on input strings. Specifically, one vulnerable function writes user-controlled data into a single-byte buffer, while the other writes into adjacent small arrays on the stack without bounds checking. Because the /proc/net/arp file reflects the system's ARP table, an attacker who can manipulate its contents—either by local access or through other means—can trigger a buffer overflow. This memory corruption can lead to denial of service (crashes) or potentially arbitrary code execution with the privileges of the affected process. The vulnerability is local in nature, requiring the attacker to influence the ARP table or have local system access. No patches or fixes are currently linked, and no public exploits have been reported. The lack of a CVSS score suggests the vulnerability is newly disclosed. The affected router models are used in various environments, including small to medium enterprises and possibly home offices, which may expose European organizations relying on these devices to risk.

Potential Impact

For European organizations, exploitation of CVE-2025-60686 could result in significant operational disruption due to denial of service or compromise of network infrastructure devices. Successful arbitrary code execution on routers could allow attackers to intercept, modify, or redirect network traffic, undermining confidentiality and integrity of communications. This is particularly critical for organizations relying on these routers for perimeter security or internal segmentation. The local nature of the exploit limits remote attack vectors; however, attackers who gain initial footholds or insider access could leverage this vulnerability to escalate privileges or establish persistent control over network devices. Given the widespread use of ToToLink routers in certain European markets, especially in small and medium-sized enterprises, the threat could impact business continuity and data protection compliance. Additionally, compromised routers could serve as pivot points for broader network intrusions or as part of botnets, amplifying the threat landscape.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify the presence of affected ToToLink router models and firmware versions. Since no official patches are currently available, administrators should consider the following mitigations: restrict local access to router management interfaces and ARP table modification capabilities; implement strict network segmentation to limit exposure of routers to untrusted users; monitor ARP table changes and unusual network behavior indicative of manipulation; disable or restrict the use of vulnerable CGI binaries if possible; apply firmware updates promptly once vendors release patches; and consider replacing affected devices with alternative models if mitigation is not feasible. Additionally, employing network intrusion detection systems (NIDS) to detect anomalous ARP activity and buffer overflow attempts can provide early warning. Regular security audits and adherence to the principle of least privilege for network device management will reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6916001feb29b6dceb02d49f

Added to database: 11/13/2025, 3:58:23 PM

Last enriched: 11/13/2025, 4:05:33 PM

Last updated: 11/14/2025, 4:10:50 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats