A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2cu.5204_B20210112. The urlKeyword parameter is not properly validated, and the function concatenates multiple user-controlled fields into a fixed-size stack buffer without performing boundary checks. A remote attacker can exploit this flaw to cause denial of service or potentially achieve arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-setParentRules-urlKeyWord-buffer.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-03 18:16
Updated : 2026-02-10 14:15
NVD link : CVE-2025-67189
Mitre link : CVE-2025-67189
CVE.ORG link : CVE-2025-67189
JSON object : View
Products Affected
totolink
- a950rg_firmware
- a950rg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
