Vulnerability Description
A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Executing manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3300R Firmware | 17.0.0cu.557_b20221024 |
| Totolink | A3300R | - |
Related Weaknesses (CWE)
References
- https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3300R/setDdnsCfg.ExploitThird Party Advisory
- https://vuldb.com/?ctiid.329909Permissions RequiredVDB Entry
- https://vuldb.com/?id.329909Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.673721Third Party AdvisoryVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2025-12239?
CVE-2025-12239 is a vulnerability with a CVSS score of 8.8 (HIGH). A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Executing manipulation can lead to buffer ov...
How severe is CVE-2025-12239?
CVE-2025-12239 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12239?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3300R Firmware, Totolink A3300R.