CVE-2025-60683
MEDIUMToToLink A720R Router V4.1.5cu.614_B20230630 - Command Injection
Title source: llmDescription
A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() without escaping. An attacker with write access to this file can execute arbitrary commands on the device.
References (3)
Core 3
Core References
Broken Link
http://totolink.com
Exploit, Third Party Advisory
https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60683.md
Product
https://www.totolink.net/
Scores
CVSS v3
6.5
EPSS
0.0605
EPSS Percentile
90.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-77
Status
published
Products (1)
totolink/a720r_firmware
4.1.5cu.614_b20230630
Published
Nov 13, 2025
Tracked Since
Feb 18, 2026