A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a local buffer and subsequently parses the line using sscanf() into a single-byte variable with the %s format specifier. Maliciously crafted /proc/stat content can overwrite adjacent stack memory, potentially allowing an attacker with filesystem write privileges to execute arbitrary code on the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 17 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.614_b20230630:*:*:*:*:*:*:*

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a720r
Totolink a720r Firmware
Vendors & Products Totolink
Totolink a720r
Totolink a720r Firmware

Thu, 13 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 5.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 15:45:00 +0000

Type Values Removed Values Added
Description A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a local buffer and subsequently parses the line using sscanf() into a single-byte variable with the %s format specifier. Maliciously crafted /proc/stat content can overwrite adjacent stack memory, potentially allowing an attacker with filesystem write privileges to execute arbitrary code on the device.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-13T17:27:56.985Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60685

cve-icon Vulnrichment

Updated: 2025-11-13T17:27:40.653Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-13T16:15:52.470

Modified: 2025-11-17T21:50:14.877

Link: CVE-2025-60685

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-14T09:28:17Z

Weaknesses