ID

VAR-202510-2188


CVE

CVE-2025-60333


TITLE

TOTOLINK N600R setWiFiMultipleConfig function stack buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-27270

DESCRIPTION

TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflow in the wepkey2 parameter in the setWiFiMultipleConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. The TOTOLINK N600R is a dual-band wireless router launched by the South Korean brand TOTOLINK in 2013. It supports concurrent operation on both 2.4GHz and 5GHz bands, with a maximum wireless transmission rate of 300Mbps. This vulnerability stems from the fact that the wepkey2 parameter in the setWiFiMultipleConfig function fails to properly validate the length of the input data

Trust: 1.44

sources: NVD: CVE-2025-60333 // CNVD: CNVD-2025-27270

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27270

AFFECTED PRODUCTS

vendor:totolinkmodel:n600rscope:eqversion:4.3.0cu.7866_b20220506

Trust: 1.0

vendor:totolinkmodel:n600r v4.3.0cu.7866 b20220506scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-27270 // NVD: CVE-2025-60333

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-60333
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-27270
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-27270
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-60333
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-27270 // NVD: CVE-2025-60333

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-60333

EXTERNAL IDS

db:NVDid:CVE-2025-60333

Trust: 1.6

db:CNVDid:CNVD-2025-27270

Trust: 0.6

sources: CNVD: CNVD-2025-27270 // NVD: CVE-2025-60333

REFERENCES

url:https://github.com/z472421519/binaryaudit/blob/main/poc/bof/totolink/wepkey2/wepkey2.md

Trust: 1.6

sources: CNVD: CNVD-2025-27270 // NVD: CVE-2025-60333

SOURCES

db:CNVDid:CNVD-2025-27270
db:NVDid:CVE-2025-60333

LAST UPDATE DATE

2025-11-19T23:10:02.983000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27270date:2025-11-07T00:00:00
db:NVDid:CVE-2025-60333date:2025-10-24T13:19:12.573

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27270date:2025-11-07T00:00:00
db:NVDid:CVE-2025-60333date:2025-10-22T16:15:44.827