🔒 CVE-2025-7837: HIGH severity buffer overflow in TOTOLINK T6 (v4.1.5cu.748_B20211015) via MQTT service. Remote, unauthenticated exploit code is public—patch ASAP & segment networks! https://radar.offseq.com/threat/cve-2025-7837-buffer-overflow-in-totolink-t6-47ae9058 #OffSeq #Vuln #IoT #RouterSecurity
LB-LINK routers (BL-AC1900 & more, ≤20250702) face CRITICAL risk: CVE-2025-7574 allows remote, unauthenticated reboot/restore via /cgi-bin/lighttpd.cgi. Public exploit, no patch yet. Restrict access & monitor! https://radar.offseq.com/threat/cve-2025-7574-improper-authentication-in-lb-link-b-84743308 #OffSeq #RouterSecurity #CVE20257574
🛑 HIGH severity: CVE-2025-7468 buffer overflow in Tenda FH1201 (1.2.0.14). Remote attackers can exploit /goform/fromSafeUrlFilter—no patch yet. Isolate devices, restrict access, and monitor now. https://radar.offseq.com/threat/cve-2025-7468-buffer-overflow-in-tenda-fh1201-9832c101 #OffSeq #Vulnerability #Infosec #RouterSecurity
🚨 HIGH severity buffer overflow (CVE-2025-7465) in Tenda FH1201 (1.2.0.14) via /goform/fromRouteStatic HTTP POST. Public exploit raises risk—monitor & limit exposure now. https://radar.offseq.com/threat/cve-2025-7465-buffer-overflow-in-tenda-fh1201-7ad2cddb #OffSeq #Vuln #RouterSecurity
⚠️ HIGH severity buffer overflow (CVE-2025-6824) in TOTOLINK X15 v1.0.0-B20230714.1105 lets remote attackers execute code via /boafrm/formParentControl. No patch yet—segment devices & harden controls. Details public! https://radar.offseq.com/threat/cve-2025-6824-buffer-overflow-in-totolink-x15-c70d1fee #OffSeq #Vuln #RouterSecurity #CVE20256824
🔥 HIGH severity: CVE-2025-6825 buffer overflow in TOTOLINK A702R ≤4.0.0-B20230721.1521 enables remote code execution via /boafrm/formWlSiteSurvey. Public exploit exists—segment and restrict access now! https://radar.offseq.com/threat/cve-2025-6825-buffer-overflow-in-totolink-a702r-60eaf1b2 #OffSeq #Vulnerability #RouterSecurity
⚠️ CVE-2025-6559 (CRITICAL): Sapido BR071n routers allow unauth'd OS cmd injection (CVSS 9.3). No patches—replace devices or isolate/secure network segments! Full compromise possible. https://radar.offseq.com/threat/cve-2025-6559-cwe-78-improper-neutralization-of-sp-a92f95d3 #OffSeq #Vuln #RouterSecurity #InfoSec
🔍 HIGH severity: Stack-based buffer overflow in TOTOLINK A3002R (v1.1.1-B20200824.0128). Remote exploit possible via /boafrm/formWlanMultipleAP. Restrict access, monitor for attacks, and seek patches. CVE-2025-6486 https://radar.offseq.com/threat/cve-2025-6486-stack-based-buffer-overflow-in-totol-081b3258 #OffSeq #Vulnerability #Infosec #RouterSecurity
🔎 HIGH severity (CVSS 8.7) stack buffer overflow in TOTOLINK EX1200T (4.1.2cu.5232_B20210713) via /cgi-bin/cstecgi.cgi. Public exploit code—remote takeover possible. Restrict access & patch ASAP. CVE-2025-6302 https://radar.offseq.com/threat/cve-2025-6302-stack-based-buffer-overflow-in-totol-41f51869 #OffSeq #Vuln #RouterSecurity #InfoSec
ASUS Routers Hacked: Over 9,000 Devices Compromised Worldwide

A massive cyber attack has hit over 9,000 ASUS routers worldwide. This attack, known as "AyySSHush", uses a combination of brute force and authentication

Blaze Trends