{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7837","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-18T19:29:42.864Z","datePublished":"2025-07-19T17:02:08.694Z","dateUpdated":"2025-07-21T15:58:11.629Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-19T17:02:08.694Z"},"title":"TOTOLINK T6 MQTT Service recvSlaveStaInfo buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"TOTOLINK","product":"T6","versions":[{"version":"4.1.5cu.748_B20211015","status":"affected"}],"modules":["MQTT Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this issue is the function recvSlaveStaInfo of the component MQTT Service. The manipulation of the argument dest leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Eine Schwachstelle wurde in TOTOLINK T6 4.1.5cu.748_B20211015 gefunden. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion recvSlaveStaInfo der Komponente MQTT Service. Durch Manipulieren des Arguments dest mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-07-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-18T21:34:45.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"reisen_1943 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.316940","name":"VDB-316940 | TOTOLINK T6 MQTT Service recvSlaveStaInfo buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.316940","name":"VDB-316940 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.617572","name":"Submit #617572 | TOTOLINK T6 V4.1.5cu.748_B20211015 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/4.md","tags":["related"]},{"url":"https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/4.md#poc","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-21T15:58:02.252775Z","id":"CVE-2025-7837","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-21T15:58:11.629Z"}}]}}