A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device.
References
| Link | Resource |
|---|---|
| http://totolink.com | Broken Link |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60682.md | Exploit Third Party Advisory |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
17 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://totolink.com - Broken Link | |
| References | () https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60682.md - Exploit, Third Party Advisory | |
| References | () https://www.totolink.net/ - Product | |
| CPE | cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.614_b20230630:*:*:*:*:*:*:* |
|
| First Time |
Totolink a720r Firmware
Totolink Totolink a720r |
13 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-77 |
13 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 16:15
Updated : 2025-11-17 19:16
NVD link : CVE-2025-60682
Mitre link : CVE-2025-60682
CVE.ORG link : CVE-2025-60682
JSON object : View
Products Affected
totolink
- a720r
- a720r_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
