CVE-2025-4824Improper Restriction of Operations within the Bounds of a Memory Buffer in A3002r

Severity
8.7HIGHNVD
EPSS
1.0%
top 23.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17

Description

A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages6 packages

CVEListV5totolink/a3002ru3.0.0-B20230809.1615
NVDtotolink/a3002ru_firmware3.0.0-b20230809.1615
CVEListV5totolink/a702r3.0.0-B20230809.1615
CVEListV5totolink/a3002r3.0.0-B20230809.1615
NVDtotolink/a702r_firmware3.0.0-b20230809.1615

🔴Vulnerability Details

2
CVEList
TOTOLINK A702R/A3002R/A3002RU HTTP POST Request formWsc buffer overflow2025-05-17
GHSA
GHSA-3264-h8mv-qcrp: A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 32025-05-17
CVE-2025-4824 — Totolink A3002r vulnerability | cvebase