ID

VAR-202310-1213


CVE

CVE-2023-46542


TITLE

TOTOLINK X2000R Gh formMeshUploadConfig method buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-23741

DESCRIPTION

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMeshUploadConfig. The TOTOLINK X2000R Gh is a WiFi 6 router released by China's TOTOLINK Electronics. It supports Gigabit networking and Easy Mesh functionality, offering multi-device connectivity and wireless expansion capabilities. The TOTOLINK X2000R Gh suffers from a buffer overflow vulnerability caused by the formMeshUploadConfig method's failure to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 1.53

sources: NVD: CVE-2023-46542 // CNVD: CNVD-2025-23741 // VULMON: CVE-2023-46542

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-23741

AFFECTED PRODUCTS

vendor:totolinkmodel:x2000rscope:eqversion:1.0.0-b20230221.0948

Trust: 1.0

vendor:totolinkmodel:x2000r gh 1.0.0-b20230221.0948.webscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-23741 // NVD: CVE-2023-46542

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-46542
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-46542
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-23741
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-23741
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-46542
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-46542
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-23741 // NVD: CVE-2023-46542 // NVD: CVE-2023-46542

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2023-46542

PATCH

title:Patch for TOTOLINK X2000R Gh formMeshUploadConfig method buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/740941

Trust: 0.6

sources: CNVD: CNVD-2025-23741

EXTERNAL IDS

db:NVDid:CVE-2023-46542

Trust: 1.7

db:CNVDid:CNVD-2025-23741

Trust: 0.6

db:VULMONid:CVE-2023-46542

Trust: 0.1

sources: CNVD: CNVD-2025-23741 // VULMON: CVE-2023-46542 // NVD: CVE-2023-46542

REFERENCES

url:https://github.com/xyiym/digging/blob/main/totolink/x2000r/13/1.md

Trust: 1.7

url:https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36

Trust: 1.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-23741 // VULMON: CVE-2023-46542 // NVD: CVE-2023-46542

SOURCES

db:CNVDid:CNVD-2025-23741
db:VULMONid:CVE-2023-46542
db:NVDid:CVE-2023-46542

LAST UPDATE DATE

2025-10-16T23:52:33.144000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-23741date:2025-10-15T00:00:00
db:VULMONid:CVE-2023-46542date:2023-10-25T00:00:00
db:NVDid:CVE-2023-46542date:2024-09-11T16:35:27.667

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-23741date:2025-10-13T00:00:00
db:VULMONid:CVE-2023-46542date:2023-10-25T00:00:00
db:NVDid:CVE-2023-46542date:2023-10-25T18:17:38.727