First published: Wed Apr 16 2025(Updated: )
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3700R Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3674 has been classified as a critical vulnerability.
CVE-2025-3674 affects the TOTOLINK A3700R router by allowing improper access controls through the setUrlFilterRules function.
An attacker can launch a remote attack exploiting CVE-2025-3674 to manipulate access controls.
To mitigate CVE-2025-3674, it is recommended to update the firmware of the TOTOLINK A3700R to the latest version available.
Yes, a firmware update is required to patch CVE-2025-3674 and secure the TOTOLINK A3700R against this vulnerability.