Severity
7.4HIGH
EPSS
0.6%
top 30.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 8

Description

A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDtotolink/n600r_firmware4.3.0cu.7866_b2022506
CVEListV5totolink/n600r4.3.0cu.7866_B20220506

🔴Vulnerability Details

2
GHSA
GHSA-45rh-24p6-9743: A security vulnerability has been detected in TOTOLINK N600R up to 42025-10-08
CVEList
TOTOLINK N600R HTTP Request cstecgi.cgi setWiFiBasicConfig buffer overflow2025-10-08

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink setWiFiBasicConfig wepkey Parameter Buffer Overflow Attempt (CVE-2025-11444)2025-10-08
CVE-2025-11444 (HIGH CVSS 7.4) | A security vulnerability has been d | cvebase.io