TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflow in the ssid parameter in the setWiFiBasicConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References
| Link | Resource |
|---|---|
| https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/sub_41E0C0/ssid.md | Exploit Third Party Advisory |
| https://github.com/z472421519/BinaryAudit/tree/main/PoC/BOF/TOTOLINK/sub_41E0C0 | Exploit Third Party Advisory |
| https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/sub_41E0C0/ssid.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
24 Oct 2025, 13:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Totolink n600r
Totolink n600r Firmware Totolink |
|
| CPE | cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:n600r_firmware:4.3.0cu.7866_b20220506:*:*:*:*:*:*:* |
|
| References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/sub_41E0C0/ssid.md - Exploit, Third Party Advisory | |
| References | () https://github.com/z472421519/BinaryAudit/tree/main/PoC/BOF/TOTOLINK/sub_41E0C0 - Exploit, Third Party Advisory |
23 Oct 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/sub_41E0C0/ssid.md - | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-121 |
22 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-22 16:15
Updated : 2025-10-24 13:19
NVD link : CVE-2025-60334
Mitre link : CVE-2025-60334
CVE.ORG link : CVE-2025-60334
JSON object : View
Products Affected
totolink
- n600r
- n600r_firmware
CWE
CWE-121
Stack-based Buffer Overflow
