CVE-2025-63466
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-05

Assigner: MITRE

Description
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the sub_426EF8 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-05
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
totolink lr350_firmware 9.3.5u.6369_b20220309
totolink lr350 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack overflow in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. It occurs via the password parameter in a specific function (sub_426EF8). An attacker can exploit this by sending a specially crafted request that causes the stack overflow, leading to a Denial of Service (DoS) condition.


How can this vulnerability impact me? :

The vulnerability can be exploited to cause a Denial of Service (DoS) on the affected device. This means the device could become unresponsive or crash, disrupting network connectivity and potentially causing downtime for users relying on the router.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart