A buffer overflow vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `global.so` binary. The `getSaveConfig` function retrieves the `http_host` parameter from user input via `websGetVar` and copies it into a fixed-size stack buffer (`v13`) using `strcpy()` without performing any length checks. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router's web interface, potentially leading to arbitrary code execution.
History

Tue, 18 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:a950rg:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a950rg_firmware:5.9c.4592_b20191022:*:*:*:*:*:*:*

Fri, 14 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a950rg
Totolink a950rg Firmware
Vendors & Products Totolink
Totolink a950rg
Totolink a950rg Firmware

Thu, 13 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_B20191022_ALL within the `global.so` binary. The `getSaveConfig` function retrieves the `http_host` parameter from user input via `websGetVar` and copies it into a fixed-size stack buffer (`v13`) using `strcpy()` without performing any length checks. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router's web interface, potentially leading to arbitrary code execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-13T00:00:00.000Z

Updated: 2025-11-14T16:50:18.223Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60699

cve-icon Vulnrichment

Updated: 2025-11-14T16:50:08.734Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-13T20:15:52.773

Modified: 2025-11-18T01:51:46.930

Link: CVE-2025-60699

cve-icon Redhat

No data.