CVE-2025-7862

A vulnerability has been found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this vulnerability is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument telnet_enabled with the input 1 leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t6_firmware:v4.1.5cu.748_b20211015:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t6:3:*:*:*:*:*:*:*

History

23 Jul 2025, 16:27

Type Values Removed Values Added
CPE cpe:2.3:h:totolink:t6:3:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t6_firmware:v4.1.5cu.748_b20211015:*:*:*:*:*:*:*
First Time Totolink t6
Totolink
Totolink t6 Firmware
References () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md - () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md - Exploit, Third Party Advisory
References () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md#poc-http - () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md#poc-http - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.316975 - () https://vuldb.com/?ctiid.316975 - Permissions Required
References () https://vuldb.com/?id.316975 - () https://vuldb.com/?id.316975 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.617643 - () https://vuldb.com/?submit.617643 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
References () https://www.youtube.com/watch?v=XeKu3tfeSME - () https://www.youtube.com/watch?v=XeKu3tfeSME - Exploit

22 Jul 2025, 15:15

Type Values Removed Values Added
References () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md - () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md -
References () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md#poc-http - () https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md#poc-http -
References () https://www.youtube.com/watch?v=XeKu3tfeSME - () https://www.youtube.com/watch?v=XeKu3tfeSME -

22 Jul 2025, 13:06

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en TOTOLINK T6 4.1.5cu.748_B20211015, clasificada como crítica. Esta vulnerabilidad afecta a la función "setTelnetCfg" del archivo /cgi-bin/cstecgi.cgi del componente Telnet Service. La manipulación del argumento telnet_enabled con la entrada "1" provoca la omisión de la autenticación. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

20 Jul 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-20 03:15

Updated : 2025-07-23 16:27


NVD link : CVE-2025-7862

Mitre link : CVE-2025-7862

CVE.ORG link : CVE-2025-7862


JSON object : View

Products Affected

totolink

  • t6
  • t6_firmware
CWE
CWE-287

Improper Authentication

CWE-306

Missing Authentication for Critical Function