3.5 CVE-2025-6401
Exploit
A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101. It has been classified as problematic. This affects an unknown part of the file /boafrm/formFilter of the component HTTP POST Message Handler. The manipulation of the argument url leads to denial of service. The exploit has been disclosed to the public and may be used.
https://nvd.nist.gov/vuln/detail/CVE-2025-6401
Categories
CWE-404 : Improper Resource Shutdown or Release
When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit
https://github.com/d2pq/cve/blob/main/616/21.md Exploit Third Party Advisory |
cna@vuldb.com Exploit
https://github.com/d2pq/cve/blob/main/616/21.md Exploit Third Party Advisory |
https://github.com/d2pq/cve/blob/main/616/21.md#poc Exploit Third Party Advisory |
https://vuldb.com/?ctiid.313395 Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.313395 Third Party Advisory VDB Entry |
https://vuldb.com/?submit.597688 Third Party Advisory VDB Entry |
https://www.totolink.net/ Product |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
AND | ||
cpe:2.3:o:totolink:n300rh_firmware:6.1c.1390_b20191101:*:*:*:*:*:*:* | ||
Running on/with | ||
cpe:2.3:h:totolink:n300rh:-:*:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
https://github.com/d2pq/cve/blob/main/616/21.md |
https://github.com/d2pq/cve/blob/main/616/21.md |
https://github.com/d2pq/cve/blob/main/616/21.md#poc |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
125 | Flooding |
Medium |
130 | Excessive Allocation |
Medium |
131 | Resource Leak Exposure |
Medium |
494 | TCP Fragmentation |
|
495 | UDP Fragmentation |
|
496 | ICMP Fragmentation |
|
666 | BlueSmacking |
Medium |
MITRE
Techniques
id | description |
---|---|
T1498.001 | Network Denial of Service: Direct Network Flood |
T1499 | Endpoint Denial of Service |
T1499.001 | Endpoint Denial of Service: OS Exhaustion Flood |
T1499.003 | Endpoint Denial of Service:Application Exhaustion Flood |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
M1037 | When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the legitimate traffic. Such defenses can be provided by the hosting Internet Service Provider (ISP) or by a 3rd party such as a Content Delivery Network (CDN) or providers specializing in DoS mitigations. Depending on flood volume, on-premises filtering may be possible by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. As immediate response may require rapid engagement of 3rd parties, analyze the risk associated to critical resources being affected by Network DoS attacks and create a disaster recovery plan/business continuity plan to respond to incidents. |
M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies. |
M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies. |
M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.