135
CVEs
3
Critical
116
High
1
KEV
50
PoC
94
Unpatched C/H
20.0%
Patch Rate
0.9%
Avg EPSS
Severity Breakdown
CRITICAL
3
HIGH
116
MEDIUM
14
LOW
1
Monthly CVE Trend
Affected Products (30)
Command Injection
22
Ex1200t Firmware
19
X15 Firmware
16
Heap Overflow
12
Archer Be230 Firmware
11
Archer Ax53 Firmware
11
T10 Firmware
7
A3002r Firmware
6
Stack Overflow
5
Memory Corruption
4
A3002ru Firmware
4
Archer C20 Firmware
3
Archer Ax3000 Firmware
3
IoT
3
Archer Ax5400 Firmware
3
Tl Wr841Nd Firmware
3
Archer Axe75 Firmware
3
A702r Firmware
3
N302r Plus Firmware
2
Null Pointer Dereference
2
Deco Be25 Firmware
2
Tapo C260 Firmware
2
Deco Xe200 Firmware
2
Deco X50 Firmware
2
Tl Wr841Nd V11 Firmware
2
Tl Wr940n Firmware
2
Archer Be400 Firmware
1
Tl Sg108E Firmware
1
T6 Firmware
1
Kp303 Firmware
1
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2025-9377 | TP-Link Archer C7 and TL-WR841N routers contain an authenticated remote command execution vulnerability in the Parental Control page, affecting end-of-life devices with no patch available. | HIGH | 8.6 | 15.6% | 119 |
KEV
No patch
|
| CVE-2024-57049 | A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 48.8%. | CRITICAL | 9.8 | 48.8% | 118 |
PoC
No patch
|
| CVE-2025-5600 | Buffer overflow in TOTOLINK EX1200T via setLanguageCfg. EPSS 0.52%. PoC available. | CRITICAL | 9.8 | 0.5% | 70 |
PoC
No patch
|
| CVE-2025-6393 | CVE-2025-6393 is a critical buffer overflow vulnerability in the HTTP POST request handler of TOTOLINK routers affecting models A702R, A3002R, A3002RU, and EX1200T across multiple firmware versions. An authenticated attacker can exploit this vulnerability by manipulating the 'submit-url' parameter in requests to /boafrm/formIPv6Addr to achieve remote code execution with full system compromise (confidentiality, integrity, and availability impact). The exploit has been publicly disclosed and may be actively exploited in the wild. | HIGH | 8.8 | 1.6% | 66 |
PoC
No patch
|
| CVE-2025-5792 | A buffer overflow vulnerability (CVSS 8.8). Risk factors: public PoC available. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5902 | Critical remote buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the setUpgradeFW function in the POST request handler. An authenticated remote attacker can exploit improper input validation on the slaveIpList parameter to achieve complete system compromise with high confidentiality, integrity, and availability impact. The vulnerability has public exploit code available and represents an actively exploitable threat. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5903 | Critical buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the setWiFiAclRules function in the POST request handler (/cgi-bin/cstecgi.cgi). An authenticated attacker can remotely exploit this vulnerability by manipulating the 'desc' parameter to achieve code execution with full system compromise (confidentiality, integrity, and availability impact). A public proof-of-concept exists, elevating real-world exploitation risk despite requiring low-privilege authentication. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5904 | A critical buffer overflow vulnerability exists in TOTOLINK T10 firmware version 4.1.8cu.5207 in the setWiFiMeshName function of the POST request handler (/cgi-bin/cstecgi.cgi). An authenticated remote attacker can overflow the device_name parameter to achieve arbitrary code execution with complete system compromise (confidentiality, integrity, and availability impact). Public exploit code is available, elevating real-world risk despite the requirement for authenticated access. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5905 | Critical buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the WiFi repeater configuration function. An authenticated remote attacker can exploit this vulnerability by sending a malicious POST request with an oversized Password parameter to /cgi-bin/cstecgi.cgi, achieving complete compromise of the device including arbitrary code execution. Public disclosure and proof-of-concept code availability significantly elevate real-world risk despite requiring authenticated access. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5907 | Critical buffer overflow vulnerability in TOTOLINK EX1200T routers (firmware versions up to 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler at the /boafrm/formFilter endpoint. An authenticated remote attacker can exploit this vulnerability to achieve remote code execution with full system compromise (confidentiality, integrity, and availability impact). The vulnerability has been publicly disclosed with exploit code available, creating immediate risk for deployed devices. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-5901 | Critical buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the UploadCustomModule function in the POST request handler at /cgi-bin/cstecgi.cgi. An authenticated remote attacker can exploit this vulnerability by manipulating the File argument to achieve buffer overflow, resulting in complete system compromise (confidentiality, integrity, and availability). The vulnerability has public exploit disclosure and represents an immediate threat to affected devices. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-6130 | A buffer overflow vulnerability (CVSS 8.8). Risk factors: public PoC available. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-6138 | Critical buffer overflow vulnerability in TOTOLINK T10 firmware version 4.1.8cu.5207 affecting the HTTP POST request handler. An authenticated attacker can remotely exploit the setWizardCfg function via the ssid5g parameter to achieve buffer overflow, resulting in complete system compromise including confidentiality, integrity, and availability breaches. Public exploit code has been disclosed and the vulnerability meets criteria for active exploitation risk. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-6144 | Critical buffer overflow vulnerability in TOTOLINK EX1200T wireless router (firmware version 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler at endpoint /boafrm/formSysCmd. An authenticated remote attacker can exploit this vulnerability by manipulating the 'submit-url' parameter to achieve buffer overflow, resulting in complete system compromise including confidentiality, integrity, and availability breaches. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|
| CVE-2025-6145 | Critical buffer overflow vulnerability in TOTOLINK EX1200T wireless router (firmware version 4.1.2cu.5232_B20210713) affecting the /boafrm/formSysLog HTTP POST handler. An authenticated attacker can exploit improper input validation on the 'submit-url' parameter to achieve buffer overflow, leading to remote code execution with complete system compromise (confidentiality, integrity, and availability impact). Public exploit code is available, and the vulnerability affects a widely deployed consumer networking device. | HIGH | 8.8 | 0.6% | 65 |
PoC
No patch
|