A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25432 A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 06 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a720r Firmware
CPEs cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.630_b20250509:*:*:*:*:*:*:*
Vendors & Products Totolink a720r Firmware

Sat, 23 Aug 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a720r
Vendors & Products Totolink
Totolink a720r

Thu, 21 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Title TOTOLINK A720R cstecgi.cgi setParentalRules buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-08-21T14:51:50.721Z

Reserved: 2025-08-21T05:32:29.697Z

Link: CVE-2025-9303

cve-icon Vulnrichment

Updated: 2025-08-21T14:51:48.297Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-21T15:15:37.067

Modified: 2025-10-06T18:48:16.970

Link: CVE-2025-9303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-23T10:55:41Z