First published: Mon Mar 24 2025(Updated: )
A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3000RU firmware | <=5.9c.5185 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2688 is classified as problematic due to its improper access control vulnerability.
To mitigate CVE-2025-2688, update the TOTOLINK A3000RU firmware to the latest version beyond 5.9c.5185.
CVE-2025-2688 affects the Syslog Configuration File Handler found in the /cgi-bin/ExportSyslog.sh file.
There is currently no public knowledge of active exploitation of CVE-2025-2688.
It is the responsibility of the users of the TOTOLINK A3000RU to address and remediate CVE-2025-2688.