Unrated severityNVD Advisory· Published Oct 8, 2025· Updated Feb 24, 2026
TOTOLINK N600R HTTP Request cstecgi.cgi setWiFiBasicConfig buffer overflow
CVE-2025-11444
Description
A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Affected products
1- cpe:2.3:o:totolink:n600r_firmware:*:*:*:*:*:*:*:*Range: 4.3.0cu.7866_B20220506
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.mdmitreexploit
- github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/TOTOLINK/wepkey/wepkey.mdmitreexploit
- vuldb.commitrethird-party-advisory
- vuldb.commitresignaturepermissions-required
- vuldb.commitrevdb-entrytechnical-description
- www.totolink.netmitreproduct
News mentions
0No linked articles in our index yet.