Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink lr1200gb Firmware
Totolink nr1800x Firmware |
|
| CPEs | cpe:2.3:h:totolink:lr1200gb:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:* cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6681_b20230703:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink lr1200gb Firmware
Totolink nr1800x Firmware |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink lr1200gb Totolink nr1800x |
|
| Vendors & Products |
Totolink
Totolink lr1200gb Totolink nr1800x |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (setDefResponse function). The binary reads the "IpAddress" parameter from a web request and copies it into a fixed-size stack buffer using strcpy() without any length validation. Maliciously crafted input can overflow the buffer, leading to potential arbitrary code execution or memory corruption, without requiring authentication. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:36:37.203Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60688
Updated: 2025-11-13T17:36:28.265Z
Status : Analyzed
Published: 2025-11-13T16:15:52.850
Modified: 2025-11-19T17:33:06.030
Link: CVE-2025-60688
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:27:56Z