Severity
7.4HIGH
EPSS
1.4%
top 19.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 10

Description

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/t104.1.8cu.5207
NVDtotolink/t10_firmware4.1.8cu.5207

🔴Vulnerability Details

2
CVEList
TOTOLINK T10 POST Request cstecgi.cgi setWiFiRepeaterCfg buffer overflow2025-06-10
GHSA
GHSA-r36p-hj2v-vj2h: A vulnerability was found in TOTOLINK T10 42025-06-10

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink setWiFiRepeaterCfg password Parameter Buffer Overflow Attempt (CVE-2025-5905)2025-06-10
CVE-2025-5905 (HIGH CVSS 7.4) | A vulnerability was found in TOTOLI | cvebase.io