Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
x6000r Vendor: totolink

About This Product

x6000r is a software product offered by totolink. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 56 known vulnerabilities affecting totolink x6000r. This includes 46 critical-severity issues and 6 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 4 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-46408 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46409 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46410 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46411 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46412 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46413 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46414 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46415 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46416 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46417 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46418 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46419 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46420 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46421 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46422 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46423 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46424 2023-10-25 2024-11-21 9.8 - -
CVE-2023-46978 2023-10-31 2024-11-21 7.5 - -
CVE-2023-46979 2023-10-31 2024-11-21 9.8 - -
CVE-2023-46484 2023-10-31 2024-11-21 9.8 - -
CVE-2023-46485 2023-10-31 2024-11-21 9.8 - -
CVE-2023-48802 2023-11-30 2025-06-05 9.8 - -
CVE-2023-48803 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48804 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48805 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48806 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48807 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48808 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48810 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48811 2023-11-30 2024-11-21 9.8 - -
CVE-2023-48812 2023-11-30 2024-11-21 9.8 - -
CVE-2023-43453 2023-12-01 2024-11-21 9.8 - -
CVE-2023-43454 2023-12-01 2024-11-21 9.8 - -
CVE-2023-43455 2023-12-01 2024-11-21 9.8 - -
CVE-2023-48801 2023-12-01 2024-11-21 9.8 - -
CVE-2023-48799 2023-12-04 2024-11-21 9.8 - -
CVE-2023-48800 2023-12-04 2024-11-21 9.8 - -
CVE-2023-50651 2023-12-30 2025-04-17 9.8 - -
CVE-2023-52041 2024-01-16 2025-06-17 9.8 - -
CVE-2023-52042 2024-01-16 2024-11-21 9.8 - -
CVE-2023-52038 2024-01-24 2025-05-30 9.8 - -
CVE-2023-52039 2024-01-24 2025-05-30 9.8 - -
CVE-2023-52040 2024-01-24 2024-11-21 9.8 - -
CVE-2024-1781 2024-02-23 2025-04-01 6.3 5.8 Unknown
CVE-2024-2353 2024-03-10 2024-12-16 8.8 9.0 Likely
CVE-2024-7907 2024-08-18 2024-08-19 6.3 6.5 Likely
CVE-2024-52723 2024-11-22 2025-03-13 9.8 - -
CVE-2025-25524 2025-02-11 2025-04-29 5.1 - -
CVE-2025-52284 2025-07-29 2025-09-15 6.5 - -
CVE-2025-52053 2025-09-15 2025-09-20 9.8 - -
CVE-2025-52905 2025-09-23 2025-10-08 7.5 - -
CVE-2025-52906 2025-09-24 2025-10-14 9.8 - -
CVE-2025-52907 2025-09-24 2025-10-14 8.8 - -
CVE-2025-11005 2025-09-25 2025-10-16 9.8 - -
CVE-2025-70328 2026-02-23 2026-02-26 8.8 - -
CVE-2026-4611 2026-03-23 2026-04-03 7.2 8.3 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for totolink x6000r by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.