CVE-2025-11444
Severity CVSS v4.0:
HIGH
Type:
CWE-119
Buffer Errors
Publication date:
08/10/2025
Last modified:
14/10/2025
Description
A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Impact
Base Score 4.0
7.40
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:totolink:n600r_firmware:*:*:*:*:*:*:*:* | 4.3.0cu.7866_b2022506 (including) | |
| cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md
- https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce
- https://vuldb.com/?ctiid_327381=
- https://vuldb.com/?id_327381=
- https://vuldb.com/?submit_666915=
- https://www.totolink.net/
- https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md
- https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce



