| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-8139 | TOTOLINK A702R HTTP POST Request formPortFw buffer overflow | TOTOLINK | A702R | High | 8.8 | 2025-07-25 08:32:09 | Deep Dive |
| CVE-2025-8138 | TOTOLINK A702R HTTP POST Request formOneKeyAccessButton buffer overflow | TOTOLINK | A702R | High | 8.8 | 2025-07-25 08:02:08 | Deep Dive |
| CVE-2025-8137 | TOTOLINK A702R HTTP POST Request formIpQoS buffer overflow | TOTOLINK | A702R | High | 8.8 | 2025-07-25 07:32:09 | Deep Dive |
| CVE-2025-8136 | TOTOLINK A702R HTTP POST Request formFilter buffer overflow | TOTOLINK | A702R | High | 8.8 | 2025-07-25 07:02:14 | Deep Dive |
| CVE-2025-7952 | TOTOLINK T6 MQTT Packet wireless.so ckeckKeepAlive command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-22 03:02:06 | Deep Dive |
| CVE-2025-7913 | TOTOLINK T6 MQTT Service updateWifiInfo buffer overflow | TOTOLINK | T6 | High | 8.8 | 2025-07-20 23:32:09 | Deep Dive |
| CVE-2025-7912 | TOTOLINK T6 MQTT Service recvSlaveUpgstatus buffer overflow | TOTOLINK | T6 | High | 8.8 | 2025-07-20 23:02:09 | Deep Dive |
| CVE-2025-7862 | TOTOLINK T6 Telnet Service cstecgi.cgi setTelnetCfg missing authentication | TOTOLINK | T6 | High | 7.3 | 2025-07-20 02:02:08 | Deep Dive |
| CVE-2025-7837 | TOTOLINK T6 MQTT Service recvSlaveStaInfo buffer overflow | TOTOLINK | T6 | High | 8.8 | 2025-07-19 17:02:09 | Deep Dive |
| CVE-2025-7758 | TOTOLINK T6 HTTP POST Request cstecgi.cgi setDiagnosisCfg buffer overflow | TOTOLINK | T6 | High | 8.8 | 2025-07-17 21:14:09 | Deep Dive |
| CVE-2025-7615 | TOTOLINK T6 HTTP POST Request cstecgi.cgi clearPairCfg command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-14 15:14:07 | Deep Dive |
| CVE-2025-7614 | TOTOLINK T6 HTTP POST Request cstecgi.cgi delDevice command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-14 15:02:10 | Deep Dive |
| CVE-2025-7613 | TOTOLINK T6 HTTP POST Request cstecgi.cgi CloudSrvVersionCheck command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-14 14:44:08 | Deep Dive |
| CVE-2025-7525 | TOTOLINK T6 HTTP POST Request cstecgi.cgi setTracerouteCfg command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-13 09:32:07 | Deep Dive |
| CVE-2025-7524 | TOTOLINK T6 HTTP POST Request cstecgi.cgi setDiagnosisCfg command injection | TOTOLINK | T6 | Medium | 6.3 | 2025-07-13 09:02:09 | Deep Dive |
| CVE-2025-7460 | TOTOLINK T6 HTTP POST Request cstecgi.cgi setWiFiAclRules buffer overflow | TOTOLINK | T6 | High | 8.8 | 2025-07-11 21:32:08 | Deep Dive |
| CVE-2025-7154 | TOTOLINK N200RE cstecgi.cgi sub_41A0F8 os command injection | TOTOLINK | N200RE | Medium | 6.3 | 2025-07-08 00:32:08 | Deep Dive |
| CVE-2025-6953 | TOTOLINK A3002RU HTTP POST Request formParentControl buffer overflow | TOTOLINK | A3002RU | High | 8.8 | 2025-07-01 13:32:07 | Deep Dive |
| CVE-2025-6940 | TOTOLINK A702R HTTP POST Request formParentControl buffer overflow | TOTOLINK | A702R | High | 8.8 | 2025-07-01 02:32:08 | Deep Dive |
| CVE-2025-6939 | TOTOLINK A3002RU HTTP POST Request formWlSiteSurvey buffer overflow | TOTOLINK | A3002RU | High | 8.8 | 2025-07-01 02:02:10 | Deep Dive |