CVE-2025-5904Improper Restriction of Operations within the Bounds of a Memory Buffer in T10

Severity
7.4HIGHNVD
EPSS
1.4%
top 19.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 10

Description

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/t104.1.8cu.5207
NVDtotolink/t10_firmware4.1.8cu.5207

🔴Vulnerability Details

2
GHSA
GHSA-m742-x7cw-3g4q: A vulnerability was found in TOTOLINK T10 42025-06-10
CVEList
TOTOLINK T10 POST Request cstecgi.cgi setWiFiMeshName buffer overflow2025-06-10

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink setWiFiMeshName device_name Parameter Buffer Overflow Attempt (CVE-2025-5904)2025-06-10
CVE-2025-5904 — Totolink T10 vulnerability | cvebase