CVE-2025-63467: n/a
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-63467 is a stack-based buffer overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_425400 function, which processes the ssid parameter. An attacker can craft a malicious request with an overly long or malformed ssid value that overflows the stack buffer, leading to memory corruption. This corruption causes the router to crash, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without any authentication or user interaction, as the ssid parameter is accessible via network requests. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network attack vector, low complexity, no privileges required) and the impact on availability. There is no impact on confidentiality or integrity since the attack only causes a crash. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability is categorized under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. Organizations using Totolink LR350 routers should be aware of this vulnerability and prepare to mitigate potential attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, particularly for those deploying Totolink LR350 routers in critical network segments. A successful exploit can cause router crashes, leading to temporary loss of internet connectivity or internal network disruptions. This can impact business operations, especially for small and medium enterprises or branch offices relying on these devices for network access. While the vulnerability does not compromise data confidentiality or integrity, the denial of service can interrupt communications, delay business processes, and potentially affect services dependent on continuous network uptime. Critical infrastructure sectors such as finance, healthcare, and manufacturing could experience operational disruptions if their networks use vulnerable Totolink devices. Additionally, the lack of available patches increases exposure time, necessitating proactive defensive measures. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability.
Mitigation Recommendations
1. Immediately isolate Totolink LR350 routers from untrusted networks or restrict access to management interfaces to trusted IPs only. 2. Implement network segmentation to limit exposure of vulnerable devices to external or less trusted internal networks. 3. Monitor network traffic for unusual or malformed requests targeting SSID parameters or router management interfaces, using IDS/IPS solutions with custom signatures if possible. 4. Disable remote management features if not required to reduce attack surface. 5. Regularly check for firmware updates from Totolink and apply patches promptly once they become available. 6. Consider replacing vulnerable devices with alternative routers from vendors with more robust security track records if patching is delayed. 7. Maintain up-to-date backups of router configurations to enable rapid recovery after a DoS event. 8. Educate network administrators about this vulnerability and encourage vigilance for signs of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63467: n/a
Description
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-63467 is a stack-based buffer overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_425400 function, which processes the ssid parameter. An attacker can craft a malicious request with an overly long or malformed ssid value that overflows the stack buffer, leading to memory corruption. This corruption causes the router to crash, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without any authentication or user interaction, as the ssid parameter is accessible via network requests. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network attack vector, low complexity, no privileges required) and the impact on availability. There is no impact on confidentiality or integrity since the attack only causes a crash. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability is categorized under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. Organizations using Totolink LR350 routers should be aware of this vulnerability and prepare to mitigate potential attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, particularly for those deploying Totolink LR350 routers in critical network segments. A successful exploit can cause router crashes, leading to temporary loss of internet connectivity or internal network disruptions. This can impact business operations, especially for small and medium enterprises or branch offices relying on these devices for network access. While the vulnerability does not compromise data confidentiality or integrity, the denial of service can interrupt communications, delay business processes, and potentially affect services dependent on continuous network uptime. Critical infrastructure sectors such as finance, healthcare, and manufacturing could experience operational disruptions if their networks use vulnerable Totolink devices. Additionally, the lack of available patches increases exposure time, necessitating proactive defensive measures. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability.
Mitigation Recommendations
1. Immediately isolate Totolink LR350 routers from untrusted networks or restrict access to management interfaces to trusted IPs only. 2. Implement network segmentation to limit exposure of vulnerable devices to external or less trusted internal networks. 3. Monitor network traffic for unusual or malformed requests targeting SSID parameters or router management interfaces, using IDS/IPS solutions with custom signatures if possible. 4. Disable remote management features if not required to reduce attack surface. 5. Regularly check for firmware updates from Totolink and apply patches promptly once they become available. 6. Consider replacing vulnerable devices with alternative routers from vendors with more robust security track records if patching is delayed. 7. Maintain up-to-date backups of router configurations to enable rapid recovery after a DoS event. 8. Educate network administrators about this vulnerability and encourage vigilance for signs of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6904d7cadadb00d130fc157c
Added to database: 10/31/2025, 3:37:46 PM
Last enriched: 11/8/2025, 2:41:26 AM
Last updated: 12/12/2025, 9:59:24 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-46289: An app may be able to access protected user data in Apple macOS
UnknownCVE-2025-46287: An attacker may be able to spoof their FaceTime caller ID in Apple macOS
UnknownCVE-2025-46285: An app may be able to gain root privileges in Apple macOS
UnknownCVE-2025-46276: An app may be able to access sensitive user data in Apple macOS
UnknownCVE-2025-43542: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime in Apple macOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.