Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63464: n/a

0
High
VulnerabilityCVE-2025-63464cvecve-2025-63464
Published: Fri Oct 31 2025 (10/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_42396C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 10/31/2025, 17:09:01 UTC

Technical Analysis

CVE-2025-63464 is a stack overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_42396C function, specifically triggered by the ssid parameter. An attacker can craft a malicious request containing a specially designed ssid value that causes a stack overflow, leading to a Denial of Service (DoS) condition by crashing or destabilizing the device. This vulnerability does not require authentication, meaning an attacker can exploit it remotely without prior access credentials, increasing the attack surface. The lack of a published patch or known exploits in the wild suggests the vulnerability is newly disclosed. The primary impact is on the availability of the affected router, potentially disrupting network connectivity for users relying on the device. The Totolink LR350 is commonly used in small office/home office (SOHO) environments, making it a target for attackers seeking to disrupt business operations or cause network outages. The absence of a CVSS score necessitates an assessment based on the vulnerability's characteristics: it affects availability, is remotely exploitable without authentication, and impacts a widely deployed device model. These factors collectively indicate a high severity level. Organizations should monitor for unusual traffic targeting the ssid parameter and restrict access to router management interfaces until a vendor patch is available.

Potential Impact

The primary impact of CVE-2025-63464 is a Denial of Service condition on Totolink LR350 routers, which can disrupt network availability. For European organizations, especially small and medium enterprises (SMEs) and home offices relying on these routers, exploitation could lead to loss of internet connectivity, interruption of business operations, and potential cascading effects on dependent services. The vulnerability could be leveraged by attackers to cause temporary outages or as part of a larger attack campaign to degrade network infrastructure. Since the exploit does not require authentication, attackers can target exposed devices remotely, increasing the risk of widespread disruption. Critical infrastructure organizations using these routers in non-segmented networks may face operational risks. Additionally, the lack of a patch means organizations must rely on mitigations to reduce exposure, increasing operational overhead. The impact on confidentiality and integrity is minimal, but the availability impact is significant, potentially affecting productivity and service delivery.

Mitigation Recommendations

1. Immediately identify and inventory all Totolink LR350 routers within the network environment. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. 3. Disable remote management features if not required to reduce the attack surface. 4. Monitor network traffic for unusual or malformed requests targeting the ssid parameter or related router services. 5. Implement intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect attempts to exploit the stack overflow. 6. Encourage users to reboot routers periodically to clear potential unstable states caused by attempted exploits. 7. Engage with Totolink support channels to obtain information on forthcoming patches or firmware updates addressing this vulnerability. 8. Consider deploying alternative router hardware or firmware if immediate patching is not feasible and risk is high. 9. Educate IT staff and users about the vulnerability and the importance of applying mitigations promptly. 10. Maintain up-to-date backups of router configurations to facilitate rapid recovery if devices become unresponsive.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904e98dae52ebddb37144ba

Added to database: 10/31/2025, 4:53:33 PM

Last enriched: 10/31/2025, 5:09:01 PM

Last updated: 11/1/2025, 1:24:20 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats