Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60333: n/a

0
High
VulnerabilityCVE-2025-60333cvecve-2025-60333
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflow in the wepkey2 parameter in the setWiFiMultipleConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

AILast updated: 10/29/2025, 17:28:51 UTC

Technical Analysis

CVE-2025-60333 is a stack-based buffer overflow vulnerability identified in the TOTOLINK N600R router firmware version 4.3.0cu.7866_B20220506. The vulnerability resides in the setWiFiMultipleConfig function, which processes the wepkey2 parameter. Improper bounds checking or validation of this parameter allows an attacker to overflow the stack, leading to memory corruption. This can cause the device to crash or reboot, resulting in a denial of service (DoS) condition. The vulnerability can be triggered remotely over the network without any authentication or user interaction, making it highly exploitable. The CVSS v3.1 base score of 7.5 reflects the ease of exploitation (network vector, no privileges required) and the impact limited to availability (no confidentiality or integrity loss). The underlying weakness corresponds to CWE-121 (stack-based buffer overflow), a common and dangerous programming error. No patches or exploits are currently known, but the lack of authentication and remote attack vector make this a significant threat to affected devices. The TOTOLINK N600R is a consumer-grade router, often deployed in small offices and home environments, which could be leveraged as a pivot point for broader network attacks if compromised.

Potential Impact

For European organizations, the primary impact of CVE-2025-60333 is the potential disruption of network connectivity due to router crashes. This can lead to temporary loss of internet access, interruption of business operations, and degraded productivity. In environments where these routers are used as part of critical infrastructure or in small branch offices, the DoS could affect communication and data flow. Although the vulnerability does not allow data theft or manipulation, the availability impact can indirectly affect confidentiality and integrity by disrupting security monitoring and response capabilities. Additionally, compromised routers could be used as footholds for further attacks within the network. The lack of authentication and remote exploitability increases the risk of automated scanning and exploitation attempts, especially if the device management interface is exposed to the internet. Organizations relying on TOTOLINK N600R devices should consider the risk of service outages and potential cascading effects on their IT infrastructure.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by implementing network segmentation and firewall rules to block external access, especially from the internet. 2. Monitor TOTOLINK’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. If firmware updates are not yet available, consider replacing affected devices with alternative routers from vendors with active security support. 4. Disable WEP encryption and migrate to more secure Wi-Fi encryption standards such as WPA3 or WPA2 to reduce attack surface. 5. Implement network monitoring to detect unusual traffic patterns or repeated attempts to exploit the wepkey2 parameter. 6. Educate IT staff about this vulnerability and ensure incident response plans include steps for router-related DoS events. 7. Regularly audit network devices for outdated firmware and unauthorized exposure to external networks. 8. Use intrusion detection/prevention systems (IDS/IPS) to identify and block exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8f7aea2d588d2bde2ff34

Added to database: 10/22/2025, 3:26:38 PM

Last enriched: 10/29/2025, 5:28:51 PM

Last updated: 12/4/2025, 7:37:17 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats