A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230714.1105. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 25 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink x15
Totolink x15 Firmware
CPEs cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink x15
Totolink x15 Firmware

Mon, 23 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 21 Jun 2025 04:00:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230714.1105. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK X15 HTTP POST Request formIPv6Addr buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-21T03:31:06.960Z

Updated: 2025-06-23T19:27:58.186Z

Reserved: 2025-06-20T10:36:13.657Z

Link: CVE-2025-6399

cve-icon Vulnrichment

Updated: 2025-06-23T16:09:38.410Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-21T04:15:23.140

Modified: 2025-06-25T20:13:30.100

Link: CVE-2025-6399

cve-icon Redhat

No data.