Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 17 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.614_b20230630:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a720r Totolink a720r Firmware |
|
| Vendors & Products |
Totolink
Totolink a720r Totolink a720r Firmware |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a local buffer and subsequently parses the line using sscanf() into a single-byte variable with the %s format specifier. Maliciously crafted /proc/stat content can overwrite adjacent stack memory, potentially allowing an attacker with filesystem write privileges to execute arbitrary code on the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:27:56.985Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60685
Updated: 2025-11-13T17:27:40.653Z
Status : Analyzed
Published: 2025-11-13T16:15:52.470
Modified: 2025-11-17T21:50:14.877
Link: CVE-2025-60685
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:28:17Z