{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4460","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-08T19:07:37.110Z","datePublished":"2025-05-09T04:00:09.052Z","dateUpdated":"2025-05-09T16:18:03.373Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-09T04:00:09.052Z"},"title":"TOTOLINK N150RT URL Filtering Page cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"TOTOLINK","product":"N150RT","versions":[{"version":"3.4.0-B20190525","status":"affected"}],"modules":["URL Filtering Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the component URL Filtering Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in TOTOLINK N150RT 3.4.0-B20190525 entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Komponente URL Filtering Page. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2025-05-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-08T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-08T21:12:49.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lcyf-fizz (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.308079","name":"VDB-308079 | TOTOLINK N150RT URL Filtering Page cross site scripting","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.308079","name":"VDB-308079 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.565956","name":"Submit #565956 | TOTOLINK N150RT V3.4.0-B20190525 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/N150RT/XSS_Url_filering","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-09T16:16:54.821322Z","id":"CVE-2025-4460","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-09T16:18:03.373Z"}}]}}