Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4122 | Buffer overflow vulnerability in TOTOLink X6000R routers V9.4.0cu.652_B20230116 due to the lack of length verification, which is related to the addition of Wi-Fi filtering rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 29 Apr 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink x6000r Totolink x6000r Firmware |
|
| CPEs | cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink x6000r Totolink x6000r Firmware |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer overflow vulnerability in TOTOLink X6000R routers V9.4.0cu.652_B20230116 due to the lack of length verification, which is related to the addition of Wi-Fi filtering rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T17:39:54.868Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25524
Updated: 2025-02-13T17:39:49.542Z
Status : Analyzed
Published: 2025-02-11T19:15:19.110
Modified: 2025-04-29T16:22:26.843
Link: CVE-2025-25524
No data.
OpenCVE Enrichment
No data.
EUVD