CVE-2025-60687
BaseFortify
Publication date: 2025-11-13
Last updated on: 2025-11-19
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | lr1200gb_firmware | 9.1.0u.6619_b20230130 |
| totolink | lr1200gb | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unauthenticated command injection in the ToToLink LR1200GB Router firmware V9.1.0u.6619_B20230130. Specifically, the cstecgi.cgi binary reads the 'imei' parameter from a web request and only checks that it is 15 characters long. It then inserts this parameter directly into a system command using sprintf() and executes it with system(). Because of this, an attacker can craft a malicious IMEI input to execute arbitrary commands on the router without needing to authenticate.
How can this vulnerability impact me? :
This vulnerability allows an attacker to execute arbitrary commands on the affected router without authentication. This can lead to full compromise of the router, including unauthorized access, control over network traffic, potential data interception, disruption of network services, and further attacks on connected devices.