A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
References
Link | Resource |
---|---|
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md | Exploit Third Party Advisory |
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce | Exploit |
https://vuldb.com/?ctiid.327381 | Permissions Required VDB Entry |
https://vuldb.com/?id.327381 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.666915 | Third Party Advisory VDB Entry |
https://www.totolink.net/ | Product |
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md | Exploit Third Party Advisory |
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
History
14 Oct 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:totolink:n600r_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:* |
|
References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md - Exploit, Third Party Advisory | |
References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce - Exploit | |
References | () https://vuldb.com/?ctiid.327381 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.327381 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.666915 - Third Party Advisory, VDB Entry | |
References | () https://www.totolink.net/ - Product | |
First Time |
Totolink
Totolink n600r Firmware Totolink n600r |
08 Oct 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md - | |
References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce - |
08 Oct 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-08 08:15
Updated : 2025-10-14 20:16
NVD link : CVE-2025-11444
Mitre link : CVE-2025-11444
CVE.ORG link : CVE-2025-11444
JSON object : View
Products Affected
totolink
- n600r
- n600r_firmware