CVE-2025-63467: n/a
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-63467 is a stack overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_425400 function, specifically in the processing of the SSID parameter. An attacker can craft a specially designed request that overflows the stack buffer, leading to a denial of service condition by crashing the device or causing it to become unresponsive. This flaw does not require authentication, meaning it can be exploited remotely by anyone able to send requests to the device's management interface or potentially through the network if exposed. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to network availability. The lack of a CVSS score suggests it is a newly published issue, but the technical details indicate a straightforward exploitation path. The impact is primarily on availability, as the stack overflow leads to device crashes or reboots, disrupting network connectivity. The absence of patches or mitigation details in the provided information highlights the need for immediate attention from affected users. The Totolink LR350 is a popular consumer and small business router, so organizations relying on these devices for critical connectivity could experience service interruptions if targeted. Network segmentation and filtering of management traffic can help reduce exposure until a firmware update is available.
Potential Impact
For European organizations, this vulnerability could lead to denial of service attacks that disrupt network availability, impacting business operations, communications, and access to critical services. Enterprises and small businesses using Totolink LR350 routers may experience outages or degraded network performance, potentially affecting productivity and customer-facing services. Critical infrastructure sectors such as healthcare, finance, and government agencies that rely on these routers for network connectivity could face operational risks. The ease of exploitation without authentication increases the threat level, especially if devices are accessible from untrusted networks or the internet. Additionally, widespread disruption could occur if attackers launch coordinated attacks targeting multiple vulnerable devices. The lack of known exploits currently limits immediate risk, but the vulnerability's nature means it could be weaponized quickly once exploit code is developed. European organizations should assess their exposure, especially those with remote or poorly segmented network management interfaces.
Mitigation Recommendations
1. Immediately audit networks to identify Totolink LR350 routers running the vulnerable firmware version 9.3.5u.6369_B20220309. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 3. Monitor network traffic for unusual or malformed requests targeting the SSID parameter or router management endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Contact Totolink or authorized vendors for firmware updates or security advisories addressing this vulnerability. 6. If no patch is available, consider replacing vulnerable devices with alternative hardware until a fix is released. 7. Implement intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts targeting the stack overflow. 8. Educate IT staff about the vulnerability and ensure incident response plans include procedures for denial of service events related to network infrastructure devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63467: n/a
Description
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-63467 is a stack overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_425400 function, specifically in the processing of the SSID parameter. An attacker can craft a specially designed request that overflows the stack buffer, leading to a denial of service condition by crashing the device or causing it to become unresponsive. This flaw does not require authentication, meaning it can be exploited remotely by anyone able to send requests to the device's management interface or potentially through the network if exposed. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to network availability. The lack of a CVSS score suggests it is a newly published issue, but the technical details indicate a straightforward exploitation path. The impact is primarily on availability, as the stack overflow leads to device crashes or reboots, disrupting network connectivity. The absence of patches or mitigation details in the provided information highlights the need for immediate attention from affected users. The Totolink LR350 is a popular consumer and small business router, so organizations relying on these devices for critical connectivity could experience service interruptions if targeted. Network segmentation and filtering of management traffic can help reduce exposure until a firmware update is available.
Potential Impact
For European organizations, this vulnerability could lead to denial of service attacks that disrupt network availability, impacting business operations, communications, and access to critical services. Enterprises and small businesses using Totolink LR350 routers may experience outages or degraded network performance, potentially affecting productivity and customer-facing services. Critical infrastructure sectors such as healthcare, finance, and government agencies that rely on these routers for network connectivity could face operational risks. The ease of exploitation without authentication increases the threat level, especially if devices are accessible from untrusted networks or the internet. Additionally, widespread disruption could occur if attackers launch coordinated attacks targeting multiple vulnerable devices. The lack of known exploits currently limits immediate risk, but the vulnerability's nature means it could be weaponized quickly once exploit code is developed. European organizations should assess their exposure, especially those with remote or poorly segmented network management interfaces.
Mitigation Recommendations
1. Immediately audit networks to identify Totolink LR350 routers running the vulnerable firmware version 9.3.5u.6369_B20220309. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 3. Monitor network traffic for unusual or malformed requests targeting the SSID parameter or router management endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Contact Totolink or authorized vendors for firmware updates or security advisories addressing this vulnerability. 6. If no patch is available, consider replacing vulnerable devices with alternative hardware until a fix is released. 7. Implement intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts targeting the stack overflow. 8. Educate IT staff about the vulnerability and ensure incident response plans include procedures for denial of service events related to network infrastructure devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6904d7cadadb00d130fc157c
Added to database: 10/31/2025, 3:37:46 PM
Last enriched: 10/31/2025, 3:54:19 PM
Last updated: 10/31/2025, 10:38:08 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12464: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-63563: n/a
UnknownCVE-2025-63561: n/a
HighCVE-2025-63562: n/a
MediumCVE-2025-10693: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in silabs.com Silicon Labs Z-Wave SDK
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.