CVE-2025-7615

MEDIUM

TOTOLINK T6 4.1.5cu.748 - Command Injection

Title source: llm
STIX 2.1

Description

A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.316315
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.316315
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.615369
Exploit, Third Party Advisory related
https://github.com/ElvisBlue/Public/blob/main/Vuln/6.md
Product product
https://www.totolink.net/

Scores

CVSS v3 6.3
EPSS 0.0159
EPSS Percentile 81.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-74 CWE-77
Status published
Products (1)
totolink/t6_firmware v4.1.5cu.748_b20211015
Published Jul 14, 2025
Tracked Since Feb 18, 2026