CVE-2025-63468
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-05
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | lr350_firmware | 9.3.5u.6369_b20220309 |
| totolink | lr350 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack overflow in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. It occurs via the http_host parameter in a specific function (sub_426EF8). An attacker can exploit this by sending a specially crafted request that causes the device to overflow its stack memory, leading to a Denial of Service (DoS) condition.
How can this vulnerability impact me? :
The vulnerability can cause a Denial of Service (DoS) on the affected Totolink LR350 device. This means an attacker can make the device unavailable or unresponsive by sending a malicious request, potentially disrupting network connectivity or services relying on this router.