Vulnerability Description
A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (sub_42F32C function). The web interface reads the "lang" parameter and constructs Help URL strings using sprintf() into fixed-size stack buffers without proper length validation. Maliciously crafted input can overflow these buffers, potentially leading to arbitrary code execution or memory corruption, without requiring authentication.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | Lr1200Gb Firmware | 9.1.0u.6619_b20230130 |
| Totolink | Lr1200Gb | - |
| Totolink | Nr1800X Firmware | 9.1.0u.6681_b20230703 |
| Totolink | Nr1800X | - |
Related Weaknesses (CWE)
References
- http://totolink.comBroken Link
- https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-LR120ExploitThird Party Advisory
- https://www.totolink.net/Product
FAQ
What is CVE-2025-60684?
CVE-2025-60684 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (sub_42F32C function)....
How severe is CVE-2025-60684?
CVE-2025-60684 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-60684?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink Lr1200Gb Firmware, Totolink Lr1200Gb, Totolink Nr1800X Firmware, Totolink Nr1800X.