Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63467: n/a

0
Unknown
VulnerabilityCVE-2025-63467cvecve-2025-63467
Published: Fri Oct 31 2025 (10/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 10/31/2025, 15:54:19 UTC

Technical Analysis

CVE-2025-63467 is a stack overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the sub_425400 function, specifically in the processing of the SSID parameter. An attacker can craft a specially designed request that overflows the stack buffer, leading to a denial of service condition by crashing the device or causing it to become unresponsive. This flaw does not require authentication, meaning it can be exploited remotely by anyone able to send requests to the device's management interface or potentially through the network if exposed. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to network availability. The lack of a CVSS score suggests it is a newly published issue, but the technical details indicate a straightforward exploitation path. The impact is primarily on availability, as the stack overflow leads to device crashes or reboots, disrupting network connectivity. The absence of patches or mitigation details in the provided information highlights the need for immediate attention from affected users. The Totolink LR350 is a popular consumer and small business router, so organizations relying on these devices for critical connectivity could experience service interruptions if targeted. Network segmentation and filtering of management traffic can help reduce exposure until a firmware update is available.

Potential Impact

For European organizations, this vulnerability could lead to denial of service attacks that disrupt network availability, impacting business operations, communications, and access to critical services. Enterprises and small businesses using Totolink LR350 routers may experience outages or degraded network performance, potentially affecting productivity and customer-facing services. Critical infrastructure sectors such as healthcare, finance, and government agencies that rely on these routers for network connectivity could face operational risks. The ease of exploitation without authentication increases the threat level, especially if devices are accessible from untrusted networks or the internet. Additionally, widespread disruption could occur if attackers launch coordinated attacks targeting multiple vulnerable devices. The lack of known exploits currently limits immediate risk, but the vulnerability's nature means it could be weaponized quickly once exploit code is developed. European organizations should assess their exposure, especially those with remote or poorly segmented network management interfaces.

Mitigation Recommendations

1. Immediately audit networks to identify Totolink LR350 routers running the vulnerable firmware version 9.3.5u.6369_B20220309. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 3. Monitor network traffic for unusual or malformed requests targeting the SSID parameter or router management endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Contact Totolink or authorized vendors for firmware updates or security advisories addressing this vulnerability. 6. If no patch is available, consider replacing vulnerable devices with alternative hardware until a fix is released. 7. Implement intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts targeting the stack overflow. 8. Educate IT staff about the vulnerability and ensure incident response plans include procedures for denial of service events related to network infrastructure devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904d7cadadb00d130fc157c

Added to database: 10/31/2025, 3:37:46 PM

Last enriched: 10/31/2025, 3:54:19 PM

Last updated: 10/31/2025, 10:38:08 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats