Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink n600r Firmware
|
|
| CPEs | cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:n600r_firmware:4.3.0cu.7866_b20220506:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink n600r Firmware
|
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink n600r |
|
| Vendors & Products |
Totolink
Totolink n600r |
Wed, 22 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflow in the wepkey2 parameter in the setWiFiMultipleConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-23T14:35:51.424Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60333
Updated: 2025-10-23T13:33:35.714Z
Status : Analyzed
Published: 2025-10-22T16:15:44.827
Modified: 2025-10-24T13:19:12.573
Link: CVE-2025-60333
No data.
OpenCVE Enrichment
Updated: 2025-10-23T10:07:36Z