Severity
6.9MEDIUM
EPSS
0.3%
top 42.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 5
Latest updateMar 17

Description

A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/a720r4.1.5cu.374
NVDtotolink/a720r_firmware4.1.5cu.374

🔴Vulnerability Details

3
GHSA
Improper S3 ownership verification in Bedrock AgentCore Starter Toolkit2026-03-17
CVEList
TOTOLINK A720R Log cstecgi.cgi access control2025-05-05
GHSA
GHSA-p9pq-9xhx-6pgq: A vulnerability was found in TOTOLINK A720R 42025-05-05
CVE-2025-4269 (MEDIUM CVSS 6.9) | A vulnerability was found in TOTOLI | cvebase.io