{"vulnerability": "CVE-2025-4268", "sightings": [{"uuid": "80e45208-de9e-4756-b74d-ecd1c3d2922b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4268", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14841", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4268\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-05T06:31:07.005Z\n\ud83d\udccf Modified: 2025-05-05T06:31:07.005Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.307372\n2. https://vuldb.com/?ctiid.307372\n3. https://vuldb.com/?submit.563429\n4. https://github.com/at0de/my_vulns/blob/main/TOTOLINK/A720R/RebootSystem.md\n5. https://www.totolink.net/", "creation_timestamp": "2025-05-05T07:19:25.000000Z"}, {"uuid": "4e4f9268-0956-47d5-9126-2ce3a410154d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4268", "type": "seen", "source": "https://t.me/cvedetector/24448", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4268 - TOTOLINK A720R Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4268 \nPublished : May 5, 2025, 7:15 a.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T11:41:46.000000Z"}, {"uuid": "c0623e53-1398-4178-8b8b-e32e7f99acec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4268", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3log5hxglf42e", "content": "", "creation_timestamp": "2025-05-05T10:21:13.007893Z"}]}