CVE-2025-3663

Severity
6.9MEDIUM
EPSS
1.6%
top 18.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. This issue affects the function setWiFiEasyCfg/setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component Password Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/a3700r9.1.2u.5822_B20200513
NVDtotolink/a3700r_firmware9.1.2u.5822_b20200513

🔴Vulnerability Details

2
CVEList
TOTOLINK A3700R Password cstecgi.cgi setWiFiEasyGuestCfg access control2025-04-16
GHSA
GHSA-c9r8-2f47-ccg6: A vulnerability, which was classified as critical, has been found in TOTOLINK A3700R 92025-04-16

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink A3700R Multiple Authentication Bypass cstecgecgi.cgi Endpoints (CVE-2025-3663 - CVE-2025-3668)2025-04-16
CVE-2025-3663 (MEDIUM CVSS 6.9) | A vulnerability | cvebase.io