ID

VAR-202510-2078


CVE

CVE-2025-12239


TITLE

TOTOLINK A3300R setDdnsCfg function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-27576

DESCRIPTION

A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Executing manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited. The TOTOLINK A3300R is a dual-band wireless router manufactured by TOTOLINK Electronics Co., Ltd. in China, primarily used in home and small network environments. This vulnerability stems from the fact that the function `setDdnsCfg` in the file `/cgi-bin/cstecgi.cgi` fails to properly validate the length of input data. Attackers could exploit this vulnerability to execute arbitrary code on the system or cause a denial-of-service attack

Trust: 1.44

sources: NVD: CVE-2025-12239 // CNVD: CNVD-2025-27576

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27576

AFFECTED PRODUCTS

vendor:totolinkmodel:a3300rscope:eqversion:17.0.0cu.557_b20221024

Trust: 1.0

vendor:totolinkmodel:a3300r 17.0.0cu.557 b20221024scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-27576 // NVD: CVE-2025-12239

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-12239
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-12239
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-27576
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-12239
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-27576
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-12239
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-12239
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-27576 // NVD: CVE-2025-12239 // NVD: CVE-2025-12239

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-12239

PATCH

title:Patch for TOTOLINK A3300R setDdnsCfg function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/752106

Trust: 0.6

sources: CNVD: CNVD-2025-27576

EXTERNAL IDS

db:NVDid:CVE-2025-12239

Trust: 1.6

db:VULDBid:329909

Trust: 1.0

db:CNVDid:CNVD-2025-27576

Trust: 0.6

sources: CNVD: CNVD-2025-27576 // NVD: CVE-2025-12239

REFERENCES

url:https://github.com/noahze01/iot-vulnerable/blob/main/totolink/a3300r/setddnscfg.md

Trust: 1.6

url:https://www.totolink.net/

Trust: 1.0

url:https://vuldb.com/?ctiid.329909

Trust: 1.0

url:https://vuldb.com/?id.329909

Trust: 1.0

url:https://vuldb.com/?submit.673721

Trust: 1.0

sources: CNVD: CNVD-2025-27576 // NVD: CVE-2025-12239

SOURCES

db:CNVDid:CNVD-2025-27576
db:NVDid:CVE-2025-12239

LAST UPDATE DATE

2025-11-19T23:22:20.844000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27576date:2025-11-11T00:00:00
db:NVDid:CVE-2025-12239date:2025-10-27T18:00:52.427

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27576date:2025-11-10T00:00:00
db:NVDid:CVE-2025-12239date:2025-10-27T07:15:39.403