Comprehensive Overview of CVEs and Security Vulnerabilities

CVE-2025-28024 TOTOLINK vulnerabilities Ivanti security advisory buffer overflow remote code execution security vulnerabilities
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 2, 2025
2 min read

CVE-2025-28024 Vulnerability in TOTOLINK A810R

TOTOLINK A810R firmware version 4.1.2cu.5182_B20201026 has a buffer overflow vulnerability located in the cstecgi.cgi file. This vulnerability has been classified under CVE-2025-28024.

Metrics

  • CVSS 4.0 Severity: Not Available
  • CVSS 3.x Severity: 9.8 (Critical)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Weakness Enumeration:
    • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

References

Threat Brief: CVE-2025-0282 and CVE-2025-0283

CVE-2025-0282 and CVE-2025-0283 impact multiple Ivanti products including Connect Secure, Policy Secure, and ZTA gateways.

CVE-2025-0282 Details

  • Type: Stack-based buffer overflow
  • Impact: Allows remote unauthenticated attackers to achieve remote code execution.
  • CVSS Score: 9.0 (Critical).

CVE-2025-0283 Details

  • Type: Stack-based buffer overflow
  • Impact: Allows local authenticated attackers to escalate privileges.
  • CVSS Score: 7.0 (High).

On January 8, 2025, Ivanti issued a security advisory regarding these vulnerabilities.

Attack Scope

  • Attackers can exploit CVE-2025-0282 by sending specially crafted requests to vulnerable appliances.
  • Specific tools and techniques associated with this attack have been observed.

Clock Icon

Recommendations

Other TOTOLINK Vulnerabilities

Several vulnerabilities have been identified in various TOTOLINK products, notably:

CVE-2025-9934

  • Product: TOTOLINK X5000R
  • Impact: Command injection vulnerability via the function sub_410C34.
  • CVSS Score: 6.3 (Medium).

CVE-2025-9935

  • Product: TOTOLINK N600R
  • Impact: Command injection vulnerability via the function sub_4159F8.
  • CVSS Score: 7.3 (High).

CVE-2025-52046

  • Product: TOTOLINK A3300R
  • Impact: Command injection vulnerability allowing unauthenticated attackers to execute arbitrary commands.
  • CVSS Score: 9.8 (Critical).

NVD CVE List

Additional Vulnerabilities

  • For a comprehensive list of TOTOLINK vulnerabilities, refer to the OpenCVE database here.

References

This technical overview provides critical information regarding recently identified vulnerabilities in TOTOLINK and Ivanti products, along with their implications and mitigation strategies.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article