ID

VAR-202310-1467


CVE

CVE-2023-46540


TITLE

TOTOLINK X2000R Gh formNtp method buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-23744

DESCRIPTION

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formNtp. The TOTOLINK X2000R Gh is a WiFi 6 router released by China's TOTOLINK Electronics. It supports Gigabit networking and Easy Mesh functionality, offering multi-device connectivity and wireless expansion capabilities. The TOTOLINK X2000R Gh suffers from a buffer overflow vulnerability caused by the formNtp method's failure to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 1.53

sources: NVD: CVE-2023-46540 // CNVD: CNVD-2025-23744 // VULMON: CVE-2023-46540

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-23744

AFFECTED PRODUCTS

vendor:totolinkmodel:x2000rscope:eqversion:1.0.0-b20230221.0948

Trust: 1.0

vendor:totolinkmodel:x2000r gh 1.0.0-b20230221.0948.webscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-23744 // NVD: CVE-2023-46540

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-46540
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-46540
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-23744
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-23744
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-46540
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-46540
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-23744 // NVD: CVE-2023-46540 // NVD: CVE-2023-46540

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2023-46540

PATCH

title:Patch for TOTOLINK X2000R Gh formNtp method buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/740956

Trust: 0.6

sources: CNVD: CNVD-2025-23744

EXTERNAL IDS

db:NVDid:CVE-2023-46540

Trust: 1.7

db:CNVDid:CNVD-2025-23744

Trust: 0.6

db:VULMONid:CVE-2023-46540

Trust: 0.1

sources: CNVD: CNVD-2025-23744 // VULMON: CVE-2023-46540 // NVD: CVE-2023-46540

REFERENCES

url:https://github.com/xyiym/digging/blob/main/totolink/x2000r/11/1.md

Trust: 1.7

url:https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36

Trust: 1.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-23744 // VULMON: CVE-2023-46540 // NVD: CVE-2023-46540

SOURCES

db:CNVDid:CNVD-2025-23744
db:VULMONid:CVE-2023-46540
db:NVDid:CVE-2023-46540

LAST UPDATE DATE

2025-10-16T23:42:10.555000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-23744date:2025-10-15T00:00:00
db:VULMONid:CVE-2023-46540date:2023-10-25T00:00:00
db:NVDid:CVE-2023-46540date:2024-09-11T16:35:26.063

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-23744date:2025-10-13T00:00:00
db:VULMONid:CVE-2023-46540date:2023-10-25T00:00:00
db:NVDid:CVE-2023-46540date:2023-10-25T18:17:38.637