A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() without escaping. An attacker with write access to this file can execute arbitrary commands on the device.
References
| Link | Resource |
|---|---|
| http://totolink.com | Broken Link |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60683.md | Exploit Third Party Advisory |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-13 16:15
Updated : 2025-11-17 19:16
NVD link : CVE-2025-60683
Mitre link : CVE-2025-60683
CVE.ORG link : CVE-2025-60683
JSON object : View
Products Affected
totolink
- a720r
- a720r_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
