{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7952","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-21T09:29:41.774Z","datePublished":"2025-07-22T03:02:06.302Z","dateUpdated":"2025-07-22T18:20:24.625Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-22T03:02:06.302Z"},"title":"TOTOLINK T6 MQTT Packet wireless.so ckeckKeepAlive command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"TOTOLINK","product":"T6","versions":[{"version":"4.1.5cu.748","status":"affected"}],"modules":["MQTT Packet Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. This vulnerability affects the function ckeckKeepAlive of the file wireless.so of the component MQTT Packet Handler. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In TOTOLINK T6 4.1.5cu.748 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion ckeckKeepAlive der Datei wireless.so der Komponente MQTT Packet Handler. Dank Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-07-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-21T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-21T11:34:48.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ElvisBlue (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.317098","name":"VDB-317098 | TOTOLINK T6 MQTT Packet wireless.so ckeckKeepAlive command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.317098","name":"VDB-317098 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.619319","name":"Submit #619319 | TOTOLINK T6 V4.1.5cu.748 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/ElvisBlue/Public/blob/main/Vuln/7.md","tags":["related"]},{"url":"https://github.com/ElvisBlue/Public/blob/main/Vuln/7.md#poc","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-22T18:18:24.305768Z","id":"CVE-2025-7952","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-22T18:20:24.625Z"}}]}}