Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12418 | A vulnerability, which was classified as critical, was found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the file /boafrm/formWdsEncrypt. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Mon, 12 May 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink n150rt Totolink n150rt Firmware |
|
| CPEs | cpe:2.3:h:totolink:n150rt:2.0:*:*:*:*:*:*:* cpe:2.3:o:totolink:n150rt_firmware:3.4.0-b20190525:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink n150rt Totolink n150rt Firmware |
Mon, 28 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 27 Apr 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the file /boafrm/formWdsEncrypt. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | TOTOLINK N150RT formWdsEncrypt buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-28T15:29:28.712Z
Reserved: 2025-04-26T08:15:50.200Z
Link: CVE-2025-3991
Updated: 2025-04-28T15:29:18.243Z
Status : Analyzed
Published: 2025-04-28T00:15:15.877
Modified: 2025-05-12T19:31:21.247
Link: CVE-2025-3991
No data.
OpenCVE Enrichment
No data.
EUVD