Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-6146 | 8.8 HIGH | TOTOLINK X15 HTTP POST Request formSysLog buffer overflow |
| CVE-2025-6145 | 8.8 HIGH | TOTOLINK EX1200T HTTP POST Request formSysLog buffer overflow |
| CVE-2025-6144 | 8.8 HIGH | TOTOLINK EX1200T HTTP POST Request formSysCmd buffer overflow |
| CVE-2025-6143 | 8.8 HIGH | TOTOLINK EX1200T HTTP POST Request formNtp buffer overflow |
| CVE-2025-6138 | 8.8 HIGH | TOTOLINK T10 HTTP POST Request cstecgi.cgi setWizardCfg buffer overflow |
| CVE-2025-6137 | 8.8 HIGH | TOTOLINK T10 HTTP POST Request cstecgi.cgi setWiFiScheduleCfg buffer overflow |
| CVE-2025-6130 | 8.8 HIGH | TOTOLINK EX1200T HTTP POST Request formStats buffer overflow |
| CVE-2025-6129 | 8.8 HIGH | TOTOLINK EX1200T HTTP POST Request formSaveConfig buffer overflow |
| CVE-2025-6139 | 3.9 LOW | TOTOLINK T10 shadow.sample hard-coded password |
No comments yet