Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink lr1200gb Firmware
|
|
| CPEs | cpe:2.3:h:totolink:lr1200gb:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink lr1200gb Firmware
|
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink lr1200gb |
|
| Vendors & Products |
Totolink
Totolink lr1200gb |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated command injection vulnerability exists in the ToToLink LR1200GB Router firmware V9.1.0u.6619_B20230130 within the cstecgi.cgi binary (sub_41EC68 function). The binary reads the "imei" parameter from a web request and verifies only that it is 15 characters long. The parameter is then directly inserted into a system command using sprintf() and executed with system(). Maliciously crafted IMEI input can execute arbitrary commands on the router without authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:35:24.532Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60687
Updated: 2025-11-13T17:35:18.496Z
Status : Analyzed
Published: 2025-11-13T16:15:52.720
Modified: 2025-11-19T17:38:41.063
Link: CVE-2025-60687
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:28:16Z