First published: Tue Apr 15 2025(Updated: )
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the pin parameter in the function setWiFiWpsConfig.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink N600R | ||
All of | ||
Totolink N600R | =4.3.0cu.7647_b20210106 | |
Totolink N600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22903 has a high severity rating due to its potential to exploit a stack overflow vulnerability.
To fix CVE-2025-22903, update the TOTOLINK N600R to the latest firmware version provided by the manufacturer.
CVE-2025-22903 specifically affects the TOTOLINK N600R router running version V4.3.0cu.7647_B20210106.
Exploitation of CVE-2025-22903 could allow unauthorized access or control over the affected device.
CVE-2025-22903 exploits the stack overflow issue via the pin parameter in the setWiFiWpsConfig function.