{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1340","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-15T14:51:52.504Z","datePublished":"2025-02-16T13:31:05.705Z","dateUpdated":"2025-02-19T14:09:44.434Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-16T13:31:05.705Z"},"title":"TOTOLINK X18 cstecgi.cgi setPasswordCfg stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"TOTOLINK","product":"X18","versions":[{"version":"9.1.0cu.2024_B20220329","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in TOTOLINK X18 9.1.0cu.2024_B20220329 entdeckt. Hiervon betroffen ist die Funktion setPasswordCfg der Datei /cgi-bin/cstecgi.cgi. Dank Manipulation durch String kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2025-02-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-15T16:23:21.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Steven_Dra3w (VulDB User)","type":"reporter"},{"lang":"en","value":"hello vuldb (VulDB User)","type":"analyst"},{"lang":"en","value":"Steven_Dra3w (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.295956","name":"VDB-295956 | TOTOLINK X18 cstecgi.cgi setPasswordCfg stack-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.295956","name":"VDB-295956 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.495368","name":"Submit #495368 | totolink x18 V9.1.0cu.2024_B20220329 stack overflow","tags":["third-party-advisory"]},{"url":"https://github.com/stevenchen0x01/CVE2/blob/main/stack_overflow.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-19T14:09:07.017786Z","id":"CVE-2025-1340","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-19T14:09:44.434Z"}}]}}