CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-4849: TOTOLINK N300RH cstecgi.cgi CloudACMunualUpdateUserdata command injection

6.3 CVSS

Description

A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101. It has been rated as critical. Affected by this issue is the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument url leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Eine kritische Schwachstelle wurde in TOTOLINK N300RH 6.1c.1390_B20191101 ausgemacht. Davon betroffen ist die Funktion CloudACMunualUpdateUserdata der Datei /cgi-bin/cstecgi.cgi. Dank der Manipulation des Arguments url mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-4849

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem Types

Command Injection Injection

Affected Products

Vendor: TOTOLINK

Product: N300RH

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.95% (probability of being exploited)

EPSS Percentile: 75.32% (scored less or equal to compared to others)

EPSS Date: 2025-06-15 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-4849
https://vuldb.com/?id.309320
https://vuldb.com/?ctiid.309320
https://vuldb.com/?submit.575072
https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/m1.md
https://www.totolink.net/

Timeline