First published: Wed Apr 16 2025(Updated: )
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513 and classified as critical. Affected by this issue is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3700R Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3666 is classified as a critical severity vulnerability.
To fix CVE-2025-3666, update the TOTOLINK A3700R firmware to the latest version that addresses the vulnerability.
CVE-2025-3666 allows for improper access controls, potentially enabling remote attackers to exploit the vulnerability.
The affected software is the TOTOLINK A3700R router running firmware version 9.1.2u.5822_B20200513.
Yes, CVE-2025-3666 can be exploited remotely due to improper access controls in the affected function.