TOTOLINK.Devices.cstecgi.Telnet.Enabling.Authentication.Bypass

2025-08-21 This signature was removed in version 33.069.

description-logoDescription

This indicates an attack attempt to exploit a Security Bypass vulnerability in TOTOLINK A720R Router.
The vulnerability is due to a hard-coded password for the root user. Remote attackers can gain root access to the device via a telnet session.

affected-products-logoAffected Products

TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2025-08-21 33.069
Removed
2024-07-23 28.831
Modified
Name:TOTOLINK.
Router.
cstecgi.
Telnet.
Enabling.
Authentication.
Bypass:TOTOLINK.
Devices.
cstecgi.
Telnet.
Enabling.
Authentication.
Bypass
2024-05-27 27.793
Modified
Name:TOTOLINK.
Router.
cstecgi.
Telnet.
Enabling.
Security.
Bypass:TOTOLINK.
Router.
cstecgi.
Telnet.
Enabling.
Authentication.
Bypass
2024-05-22 27.791
Modified
Name:TOTOLINK.
Router.
Cstecgi.
Telnet.
Enabling.
Security.
Bypass:TOTOLINK.
Router.
cstecgi.
Telnet.
Enabling.
Security.
Bypass
2024-03-19 27.751
Modified
Name:Totolink.
Router.
Cstecgi.
Telnet.
Enabling.
Security.
Bypass:TOTOLINK.
Router.
Cstecgi.
Telnet.
Enabling.
Security.
Bypass
2023-02-22 22.500
Modified
Default_action:pass:drop
2023-02-07 22.491
New