CVE-2025-7952

Severity
5.3MEDIUM
EPSS
3.0%
top 13.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22

Description

A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. This vulnerability affects the function ckeckKeepAlive of the file wireless.so of the component MQTT Packet Handler. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/t64.1.5cu.748
NVDtotolink/t6_firmwarev4.1.5cu.748_b20211015

🔴Vulnerability Details

2
CVEList
TOTOLINK T6 MQTT Packet wireless.so ckeckKeepAlive command injection2025-07-22
GHSA
GHSA-mh37-2gxv-wprp: A vulnerability classified as critical was found in TOTOLINK T6 42025-07-22

🔍Detection Rules

1
Suricata
ET EXPLOIT Totolink MQTT ckeckKeepAlive ipAddr Parameter Command Injection Attempt (CVE-2025-7952)2025-07-22
CVE-2025-7952 (MEDIUM CVSS 5.3) | A vulnerability classified as criti | cvebase.io