A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue resides in the setRadvdCfg interface of the /lib/cste_modules/ipv6.so module. The function fails to properly validate the length of the user-controlled radvdinterfacename parameter, allowing remote attackers to trigger a stack buffer overflow.
References
| Link | Resource |
|---|---|
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-ipv6-setRadvdCfg-radvdinterfacename-buffer.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-03 18:16
Updated : 2026-02-10 14:15
NVD link : CVE-2025-67188
Mitre link : CVE-2025-67188
CVE.ORG link : CVE-2025-67188
JSON object : View
Products Affected
totolink
- a950rg_firmware
- a950rg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
