Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a720r Firmware
Totolink lr1200gb Firmware Totolink nr1800x Firmware |
|
| CPEs | cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:lr1200gb:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.614_b20230630:*:*:*:*:*:*:* cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:* cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6681_b20230703:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink a720r Firmware
Totolink lr1200gb Firmware Totolink nr1800x Firmware |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a720r Totolink lr1200gb Totolink nr1800x |
|
| Vendors & Products |
Totolink
Totolink a720r Totolink lr1200gb Totolink nr1800x |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local stack-based buffer overflow vulnerability exists in the infostat.cgi and cstecgi.cgi binaries of ToToLink routers (A720R V4.1.5cu.614_B20230630, LR1200GB V9.1.0u.6619_B20230130, and NR1800X V9.1.0u.6681_B20230703). Both programs parse the contents of /proc/net/arp using sscanf() with "%s" format specifiers into fixed-size stack buffers without length validation. Specifically, one function writes user-controlled data into a single-byte buffer, and the other into adjacent small arrays without bounds checking. An attacker who controls the contents of /proc/net/arp can trigger memory corruption, leading to denial of service or potential arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:37:44.079Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60686
Updated: 2025-11-13T17:37:38.550Z
Status : Analyzed
Published: 2025-11-13T16:15:52.590
Modified: 2025-11-19T17:41:28.740
Link: CVE-2025-60686
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:28:22Z