ID

VAR-202506-0365


CVE

CVE-2025-5790


TITLE

TOTOLINK  of  X15  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-006557

DESCRIPTION

A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. This vulnerability affects unknown code of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of X15 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TOTOLINK X15 is a network wireless extender from China's TOTOLINK Electronics. TOTOLINK X15 has a buffer overflow vulnerability, which is caused by the parameter mac in the file /boafrm/formIpQoS failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-5790 // JVNDB: JVNDB-2025-006557 // CNVD: CNVD-2025-12084

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12084

AFFECTED PRODUCTS

vendor:totolinkmodel:x15scope:eqversion:1.0.0-b20230714.1105

Trust: 1.0

vendor:totolinkmodel:x15scope:eqversion:x15 firmware 1.0.0-b20230714.1105

Trust: 0.8

vendor:totolinkmodel:x15scope: - version: -

Trust: 0.8

vendor:totolinkmodel:x15scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:1.0.0-b20230714.1105scope:eqversion:x15

Trust: 0.6

sources: CNVD: CNVD-2025-12084 // JVNDB: JVNDB-2025-006557 // NVD: CVE-2025-5790

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5790
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-5790
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-006557
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-12084
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5790
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-006557
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12084
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5790
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-5790
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-006557
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12084 // JVNDB: JVNDB-2025-006557 // NVD: CVE-2025-5790 // NVD: CVE-2025-5790

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006557 // NVD: CVE-2025-5790

EXTERNAL IDS

db:NVDid:CVE-2025-5790

Trust: 3.2

db:VULDBid:311338

Trust: 1.8

db:JVNDBid:JVNDB-2025-006557

Trust: 0.8

db:CNVDid:CNVD-2025-12084

Trust: 0.6

sources: CNVD: CNVD-2025-12084 // JVNDB: JVNDB-2025-006557 // NVD: CVE-2025-5790

REFERENCES

url:https://github.com/awindog/cve/blob/main/12.md

Trust: 2.4

url:https://vuldb.com/?id.311338

Trust: 1.8

url:https://vuldb.com/?submit.591219

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.311338

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5790

Trust: 0.8

sources: CNVD: CNVD-2025-12084 // JVNDB: JVNDB-2025-006557 // NVD: CVE-2025-5790

SOURCES

db:CNVDid:CNVD-2025-12084
db:JVNDBid:JVNDB-2025-006557
db:NVDid:CVE-2025-5790

LAST UPDATE DATE

2025-06-15T23:40:51.225000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12084date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006557date:2025-06-10T06:22:00
db:NVDid:CVE-2025-5790date:2025-06-09T19:08:31.530

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12084date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006557date:2025-06-10T00:00:00
db:NVDid:CVE-2025-5790date:2025-06-06T18:15:35.840