CVE Alert: CVE-2025-12239 – TOTOLINK – A3300R

CVE-2025-12239

HIGHNo exploitation known

A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Executing manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

CVSS v3.1 (8.8)
Vendor
TOTOLINK
Product
A3300R
Versions
17.0.0cu.557_B20221024
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-27T06:32:10.266Z
Updated
2025-10-27T06:32:10.266Z

AI Summary Analysis

Risk verdict

High risk: remote exploit with public PoC for a buffer overflow in a management CGI endpoint, requiring at least a low-privilege account and no user interaction.

Why this matters

A3300R devices are common in SMB and home networks; compromising the device could give an attacker full control of the router, enabling data exfiltration, traffic manipulation, or pivoting to internal hosts. The high impact on confidentiality, integrity and availability, combined with public disclosure, raises the likelihood of opportunistic exploitation.

Most likely attack path

Attacker gains or already has a low-privilege admin credential to access the device’s management interface, then sends a crafted request to /cgi-bin/cstecgi.cgi/setDdnsCfg to trigger a buffer overflow. Successful exploitation yields code execution on the device, potentially enabling persistence and network-wide impact; no user interaction is required beyond authenticated access.

Who is most exposed

Typical deployments include consumer and small business routers exposed to WAN or internet-facing management interfaces; devices with weak credentials or unsegmented networks are especially at risk.

Detection ideas

  • spikes or unusual patterns in POST requests to /cgi-bin/cstecgi.cgi/setDdnsCfg
  • oversized payloads or anomalous parameters in that endpoint
  • router reboot/crash logs or core dumps linked to the CGI process
  • authentication events followed by rapid configuration changes
  • unexpected new processes or high CPU utilisation after login

Mitigation and prioritisation

  • Apply the latest firmware patch from TOTOLINK; verify the version includes the fix.
  • If patching is not possible, disable or restrict WAN management/admin access; implement IP whitelisting.
  • Enforce strong admin credentials; disable default accounts; rotate credentials where feasible.
  • Network segmentation and host/firewall rules to limit lateral movement; monitor for repeated attempts to access the CGI endpoint.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1; otherwise treat as high priority with rapid remediation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features