Vulnerability Description
A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a local buffer and subsequently parses the line using sscanf() into a single-byte variable with the %s format specifier. Maliciously crafted /proc/stat content can overwrite adjacent stack memory, potentially allowing an attacker with filesystem write privileges to execute arbitrary code on the device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A720R Firmware | 4.1.5cu.614_b20230630 |
| Totolink | A720R | - |
Related Weaknesses (CWE)
References
- http://totolink.comBroken Link
- https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720RExploitThird Party Advisory
- https://www.totolink.net/Product
FAQ
What is CVE-2025-60685?
CVE-2025-60685 is a vulnerability with a CVSS score of 5.1 (MEDIUM). A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a l...
How severe is CVE-2025-60685?
CVE-2025-60685 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-60685?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A720R Firmware, Totolink A720R.