CVE-2025-7524 – “TOTOLINK T6 HTTP POST Request Handler Command Injection Vulnerability”

The following table lists the changes that have been made to the
CVE-2025-7524 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 13, 2025

    Action Type Old Value New Value
    Added Description A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    Added CVSS V2 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
    Added CWE CWE-77
    Added CWE CWE-74
    Added Reference https://github.com/ElvisBlue/Public/blob/main/Vuln/2.md
    Added Reference https://github.com/ElvisBlue/Public/blob/main/Vuln/2.md#poc
    Added Reference https://vuldb.com/?ctiid.316221
    Added Reference https://vuldb.com/?id.316221
    Added Reference https://vuldb.com/?submit.612935
    Added Reference https://www.totolink.net/
    Added Reference https://www.youtube.com/watch?v=T62BuSoHmoM
Share the Post:

Related Posts