First published: Tue Feb 11 2025(Updated: )
Buffer overflow vulnerability in TOTOLink X6000R routers V9.4.0cu.652_B20230116 due to the lack of length verification, which is related to the addition of Wi-Fi filtering rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink X6000R AX3000 | =V9.4.0cu.652_B20230116 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25524 is classified as a critical vulnerability due to its potential to allow remote code execution and device crashes.
To fix CVE-2025-25524, update your TOTOLink X6000R router to the latest firmware version provided by the manufacturer.
CVE-2025-25524 specifically affects TOTOLink X6000R routers running version V9.4.0cu.652_B20230116.
CVE-2025-25524 is a buffer overflow vulnerability that occurs due to a lack of length verification when adding Wi-Fi filtering rules.
Exploiting CVE-2025-25524 can lead to denial of service by crashing the device or executing arbitrary code, potentially compromising the network.