ID

VAR-202506-0343


CVE

CVE-2025-5789


TITLE

TOTOLINK  of  X15  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-006535

DESCRIPTION

A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of X15 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TOTOLINK X15 is a network wireless extender from China's TOTOLINK Electronics. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-5789 // JVNDB: JVNDB-2025-006535 // CNVD: CNVD-2025-12076

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12076

AFFECTED PRODUCTS

vendor:totolinkmodel:x15scope:eqversion:1.0.0-b20230714.1105

Trust: 1.0

vendor:totolinkmodel:x15scope:eqversion:x15 firmware 1.0.0-b20230714.1105

Trust: 0.8

vendor:totolinkmodel:x15scope: - version: -

Trust: 0.8

vendor:totolinkmodel:x15scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:1.0.0-b20230714.1105scope:eqversion:x15

Trust: 0.6

sources: CNVD: CNVD-2025-12076 // JVNDB: JVNDB-2025-006535 // NVD: CVE-2025-5789

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5789
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-5789
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-006535
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-12076
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5789
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-006535
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12076
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5789
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-5789
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-006535
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12076 // JVNDB: JVNDB-2025-006535 // NVD: CVE-2025-5789 // NVD: CVE-2025-5789

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006535 // NVD: CVE-2025-5789

EXTERNAL IDS

db:NVDid:CVE-2025-5789

Trust: 3.2

db:VULDBid:311337

Trust: 1.8

db:JVNDBid:JVNDB-2025-006535

Trust: 0.8

db:CNVDid:CNVD-2025-12076

Trust: 0.6

sources: CNVD: CNVD-2025-12076 // JVNDB: JVNDB-2025-006535 // NVD: CVE-2025-5789

REFERENCES

url:https://github.com/awindog/cve/blob/main/11.md

Trust: 2.4

url:https://vuldb.com/?id.311337

Trust: 1.8

url:https://vuldb.com/?submit.591218

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.311337

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5789

Trust: 0.8

sources: CNVD: CNVD-2025-12076 // JVNDB: JVNDB-2025-006535 // NVD: CVE-2025-5789

SOURCES

db:CNVDid:CNVD-2025-12076
db:JVNDBid:JVNDB-2025-006535
db:NVDid:CVE-2025-5789

LAST UPDATE DATE

2025-06-15T23:31:57.048000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12076date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006535date:2025-06-10T01:58:00
db:NVDid:CVE-2025-5789date:2025-06-09T19:08:42.200

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12076date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006535date:2025-06-10T00:00:00
db:NVDid:CVE-2025-5789date:2025-06-06T18:15:35.650