A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/lin-3-start/lin-cve/blob/main/TOTOLINK%20A720R/TOTOLINK-A720R.md | Exploit Third Party Advisory |
| https://github.com/lin-3-start/lin-cve/blob/main/TOTOLINK%20A720R/TOTOLINK-A720R.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.320908 | Permissions Required VDB Entry |
| https://vuldb.com/?id.320908 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.632410 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-21 15:15
Updated : 2025-10-06 18:48
NVD link : CVE-2025-9303
Mitre link : CVE-2025-9303
CVE.ORG link : CVE-2025-9303
JSON object : View
Products Affected
totolink
- a720r_firmware
- a720r
