ID

VAR-202510-0241


CVE

CVE-2025-11444


TITLE

TOTOLINK  of  n600r  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-016195

DESCRIPTION

A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. TOTOLINK of n600r The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK N600R is a dual-band wireless router released by the Korean brand TOTOLINK in 2013. It supports concurrent operation in the 2.4GHz and 5GHz bands and offers a maximum wireless transmission rate of 300Mbps. The TOTOLINK N600R suffers from a buffer overflow vulnerability caused by the wepkey parameter in the /cgi-bin/cstecgi.cgi file failing to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-11444 // JVNDB: JVNDB-2025-016195 // CNVD: CNVD-2025-23584

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-23584

AFFECTED PRODUCTS

vendor:totolinkmodel:n600rscope:lteversion:4.3.0cu.7866_b2022506

Trust: 1.0

vendor:totolinkmodel:n600rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:n600rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:n600rscope:lteversion:n600r firmware 4.3.0cu.7866 b2022506 and earlier

Trust: 0.8

vendor:totolinkmodel:n600r <=4.3.0cu.7866 b20220506scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-23584 // JVNDB: JVNDB-2025-016195 // NVD: CVE-2025-11444

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11444
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-016195
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-23584
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-11444
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-016195
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-23584
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11444
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-016195
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-23584 // JVNDB: JVNDB-2025-016195 // NVD: CVE-2025-11444

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-016195 // NVD: CVE-2025-11444

EXTERNAL IDS

db:NVDid:CVE-2025-11444

Trust: 3.2

db:VULDBid:327381

Trust: 1.8

db:JVNDBid:JVNDB-2025-016195

Trust: 0.8

db:CNVDid:CNVD-2025-23584

Trust: 0.6

sources: CNVD: CNVD-2025-23584 // JVNDB: JVNDB-2025-016195 // NVD: CVE-2025-11444

REFERENCES

url:https://github.com/z472421519/binaryaudit/blob/main/poc/bof/totolink/wepkey/wepkey.md

Trust: 2.4

url:https://github.com/z472421519/binaryaudit/blob/main/poc/bof/totolink/wepkey/wepkey.md#reproduce

Trust: 1.8

url:https://vuldb.com/?id.327381

Trust: 1.8

url:https://vuldb.com/?submit.666915

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.327381

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-11444

Trust: 0.8

sources: CNVD: CNVD-2025-23584 // JVNDB: JVNDB-2025-016195 // NVD: CVE-2025-11444

SOURCES

db:CNVDid:CNVD-2025-23584
db:JVNDBid:JVNDB-2025-016195
db:NVDid:CVE-2025-11444

LAST UPDATE DATE

2025-10-17T23:25:41.845000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-23584date:2025-10-14T00:00:00
db:JVNDBid:JVNDB-2025-016195date:2025-10-16T07:55:00
db:NVDid:CVE-2025-11444date:2025-10-14T20:16:01.657

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-23584date:2025-10-14T00:00:00
db:JVNDBid:JVNDB-2025-016195date:2025-10-16T00:00:00
db:NVDid:CVE-2025-11444date:2025-10-08T08:15:32.917