TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilterRules interface of /lib/cste_modules/firewall.so. The vulnerability occurs because the `url` parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
References
| Link | Resource |
|---|---|
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-setUrlFliterRules-url-buffer.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-03 18:16
Updated : 2026-02-10 14:17
NVD link : CVE-2025-67186
Mitre link : CVE-2025-67186
CVE.ORG link : CVE-2025-67186
JSON object : View
Products Affected
totolink
- a950rg_firmware
- a950rg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
