CVE-2025-7613

Severity
5.3MEDIUM
EPSS
1.8%
top 17.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 14

Description

A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/t64.1.5cu.748
NVDtotolink/t6_firmwarev4.1.5cu.748_b20211015

🔴Vulnerability Details

2
GHSA
GHSA-93qm-7rvr-h5vr: A vulnerability was found in TOTOLINK T6 42025-07-14
CVEList
TOTOLINK T6 HTTP POST Request cstecgi.cgi CloudSrvVersionCheck command injection2025-07-14
CVE-2025-7613 (MEDIUM CVSS 5.3) | A vulnerability was found in TOTOLI | cvebase.io