{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1829","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-01T19:44:24.717Z","datePublished":"2025-03-02T19:00:07.619Z","dateUpdated":"2025-03-03T18:05:43.969Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-02T19:00:07.619Z"},"title":"TOTOLINK X18 cstecgi.cgi setMtknatCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"TOTOLINK","product":"X18","versions":[{"version":"9.1.0cu.2024_B20220329","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In TOTOLINK X18 9.1.0cu.2024_B20220329 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft die Funktion setMtknatCfg der Datei /cgi-bin/cstecgi.cgi. Durch das Manipulieren des Arguments mtkhnatEnable mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-01T20:49:35.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Calmc1 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.298096","name":"VDB-298096 | TOTOLINK X18 cstecgi.cgi setMtknatCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.298096","name":"VDB-298096 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.504983","name":"Submit #504983 | TOTOLINK X18 Wireless Device V9.1.0cu.2024_B20220329 Remote Code Execution (RCE)","tags":["third-party-advisory"]},{"url":"https://github.com/sjwszt/CVE/blob/main/CVE_2.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"references":[{"url":"https://github.com/sjwszt/CVE/blob/main/CVE_2.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-03T18:05:27.376393Z","id":"CVE-2025-1829","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-03T18:05:43.969Z"}}]}}