Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Totolink — Vulnerabilities & Security Advisories 430

Browse all 430 CVE security advisories affecting Totolink. AI-powered Chinese analysis, POCs, and references for each vulnerability.

TOTOLINK operates primarily as a manufacturer of consumer networking hardware, including wireless routers and range extenders, targeting residential and small business markets. Security audits reveal a significant volume of vulnerabilities, with 429 CVEs currently documented, indicating systemic issues in firmware development and code review processes. Historically, the most prevalent flaw classes include Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation bugs, often stemming from inadequate input validation and weak authentication mechanisms in web management interfaces. These defects frequently allow unauthenticated attackers to gain full administrative control or execute arbitrary commands on affected devices. While no single catastrophic global incident has been widely publicized, the sheer quantity of disclosed vulnerabilities suggests a consistent pattern of security negligence. Users are advised to exercise caution, as the vendor’s response to patching these critical flaws has been inconsistent, leaving many deployed units exposed to exploitation.

Found 16 results / 430Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2025-8170 TOTOLINK T6 MQTT Packet meshSlaveDlfw tcpcheck_net buffer overflow — T6CWE-120 8.8 High2025-07-25
CVE-2025-7952 TOTOLINK T6 MQTT Packet wireless.so ckeckKeepAlive command injection — T6CWE-77 6.3 Medium2025-07-22
CVE-2025-7913 TOTOLINK T6 MQTT Service updateWifiInfo buffer overflow — T6CWE-120 8.8 High2025-07-20
CVE-2025-7912 TOTOLINK T6 MQTT Service recvSlaveUpgstatus buffer overflow — T6CWE-120 8.8 High2025-07-20
CVE-2025-7862 TOTOLINK T6 Telnet Service cstecgi.cgi setTelnetCfg missing authentication — T6CWE-306 7.3 High2025-07-20
CVE-2025-7837 TOTOLINK T6 MQTT Service recvSlaveStaInfo buffer overflow — T6CWE-120 8.8 High2025-07-19
CVE-2025-7758 TOTOLINK T6 HTTP POST Request cstecgi.cgi setDiagnosisCfg buffer overflow — T6CWE-120 8.8 High2025-07-17
CVE-2025-7615 TOTOLINK T6 HTTP POST Request cstecgi.cgi clearPairCfg command injection — T6CWE-77 6.3 Medium2025-07-14
CVE-2025-7614 TOTOLINK T6 HTTP POST Request cstecgi.cgi delDevice command injection — T6CWE-77 6.3 Medium2025-07-14
CVE-2025-7613 TOTOLINK T6 HTTP POST Request cstecgi.cgi CloudSrvVersionCheck command injection — T6CWE-77 6.3 Medium2025-07-14
CVE-2025-7525 TOTOLINK T6 HTTP POST Request cstecgi.cgi setTracerouteCfg command injection — T6CWE-77 6.3 Medium2025-07-13
CVE-2025-7524 TOTOLINK T6 HTTP POST Request cstecgi.cgi setDiagnosisCfg command injection — T6CWE-77 6.3 Medium2025-07-13
CVE-2025-7460 TOTOLINK T6 HTTP POST Request cstecgi.cgi setWiFiAclRules buffer overflow — T6CWE-120 8.8 High2025-07-11
CVE-2025-6916 TOTOLINK T6 formLoginAuth.htm Form_Login missing authentication — T6CWE-306 8.8 High2025-06-30
CVE-2023-7223 Totolink T6 cstecgi.cgi access control — T6CWE-284 5.3 Medium2024-01-09
CVE-2023-7221 Totolink T6 HTTP POST Request main buffer overflow — T6CWE-120 9.8 Critical2024-01-09

This page lists every published CVE security advisory associated with Totolink. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.