First published: Thu May 08 2025(Updated: )
TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack overflow via the ssid parameter in the setWiFiGuestCfg function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink NR1800X Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-45843 is classified as a high-severity vulnerability due to its potential to allow remote code execution through an authenticated stack overflow.
To mitigate CVE-2025-45843, it is recommended to update the firmware of the TOTOLINK NR1800X to the latest version provided by the vendor.
Users of the TOTOLINK NR1800X firmware version V9.1.0u.6681_B20230703 are affected by CVE-2025-45843.
CVE-2025-45843 exploits a vulnerability in the setWiFiGuestCfg function, specifically through an authenticated stack overflow via the ssid parameter.
CVE-2025-45843 is an authenticated remote vulnerability, which means it requires access to the device’s authenticated session.