CVE-2025-11444
HIGHTOTOLINK N600R <4.3.0cu.7866_B20220506 - Buffer Overflow
Title source: llmDescription
A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.327381
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.327381
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.666915
Exploit, Third Party Advisory exploit
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md
Exploit exploit
https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.md#reproduce
Product product
https://www.totolink.net/
Scores
CVSS v3
8.8
EPSS
0.0060
EPSS Percentile
69.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-119
CWE-120
Status
published
Products (1)
totolink/n600r_firmware
< 4.3.0cu.7866_b2022506
Published
Oct 08, 2025
Tracked Since
Feb 18, 2026