Severity
7.4HIGH
EPSS
1.4%
top 19.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateJun 10

Description

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This issue affects the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument slaveIpList leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/t104.1.8cu.5207
NVDtotolink/t10_firmware4.1.8cu.5207

🔴Vulnerability Details

2
GHSA
GHSA-6mq6-6457-rccm: A vulnerability was found in TOTOLINK T10 42025-06-10
CVEList
TOTOLINK T10 POST Request cstecgi.cgi setUpgradeFW buffer overflow2025-06-09

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink setUpgradeFW slaveIpList Parameter Command Injection Attempt (CVE-2025-5902)2025-06-10
CVE-2025-5902 (HIGH CVSS 7.4) | A vulnerability was found in TOTOLI | cvebase.io