A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() without escaping. An attacker with write access to this file can execute arbitrary commands on the device.
References
| Link | Resource |
|---|---|
| http://totolink.com | Broken Link |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60683.md | Exploit Third Party Advisory |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
17 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://totolink.com - Broken Link | |
| References | () https://github.com/yifan20020708/SGTaint-0-day/blob/main/ToToLink/ToToLink-A720R/CVE-2025-60683.md - Exploit, Third Party Advisory | |
| References | () https://www.totolink.net/ - Product | |
| CPE | cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.614_b20230630:*:*:*:*:*:*:* |
|
| First Time |
Totolink a720r Firmware
Totolink Totolink a720r |
13 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-77 |
13 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 16:15
Updated : 2025-11-17 19:16
NVD link : CVE-2025-60683
Mitre link : CVE-2025-60683
CVE.ORG link : CVE-2025-60683
JSON object : View
Products Affected
totolink
- a720r
- a720r_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
