Buffer overflow vulnerability in TOTOLink X6000R routers V9.4.0cu.652_B20230116 due to the lack of length verification, which is related to the addition of Wi-Fi filtering rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References
Link | Resource |
---|---|
https://gist.github.com/XiaoCurry/ce1f80afd2d8be8ca543437f16eae96b | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
29 Apr 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:* |
|
First Time |
Totolink
Totolink x6000r Totolink x6000r Firmware |
|
References | () https://gist.github.com/XiaoCurry/ce1f80afd2d8be8ca543437f16eae96b - Broken Link |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.1 |
Summary |
|
11 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 19:15
Updated : 2025-04-29 16:22
NVD link : CVE-2025-25524
Mitre link : CVE-2025-25524
CVE.ORG link : CVE-2025-25524
JSON object : View
Products Affected
totolink
- x6000r_firmware
- x6000r
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')