CVE-2025-2688

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3000RU-ExportSyslog-1b953a41781f8064970dc7809a52ac6c?pvs=4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.300709 Permissions Required VDB Entry
https://vuldb.com/?id.300709 Third Party Advisory VDB Entry
https://vuldb.com/?submit.521570 Third Party Advisory VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3000ru_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3000ru:-:*:*:*:*:*:*:*

History

02 Jul 2025, 18:03

Type Values Removed Values Added
References () https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3000RU-ExportSyslog-1b953a41781f8064970dc7809a52ac6c?pvs=4 - () https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3000RU-ExportSyslog-1b953a41781f8064970dc7809a52ac6c?pvs=4 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.300709 - () https://vuldb.com/?ctiid.300709 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.300709 - () https://vuldb.com/?id.300709 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.521570 - () https://vuldb.com/?submit.521570 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
Summary
  • (es) Se detectó una vulnerabilidad clasificada como problemática en TOTOLINK A3000RU hasta la versión 5.9c.5185. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /cgi-bin/ExportSyslog.sh del componente Syslog Configuration File Handler. Esta manipulación genera controles de acceso inadecuados. El ataque debe realizarse dentro de la red local. Se ha hecho público el exploit y puede que sea utilizado.
CPE cpe:2.3:h:totolink:a3000ru:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3000ru_firmware:*:*:*:*:*:*:*:*
First Time Totolink a3000ru
Totolink
Totolink a3000ru Firmware

24 Mar 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-24 07:15

Updated : 2025-07-02 18:03


NVD link : CVE-2025-2688

Mitre link : CVE-2025-2688

CVE.ORG link : CVE-2025-2688


JSON object : View

Products Affected

totolink

  • a3000ru_firmware
  • a3000ru
CWE
CWE-266

Incorrect Privilege Assignment

CWE-284

Improper Access Control