CVE-2025-4826Improper Restriction of Operations within the Bounds of a Memory Buffer in A3002r

Severity
8.7HIGHNVD
EPSS
1.0%
top 23.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages6 packages

CVEListV5totolink/a3002ru3.0.0-B20230809.1615
NVDtotolink/a3002ru_firmware3.0.0-b20230809.1615
CVEListV5totolink/a702r3.0.0-B20230809.1615
CVEListV5totolink/a3002r3.0.0-B20230809.1615
NVDtotolink/a702r_firmware3.0.0-b20230809.1615

🔴Vulnerability Details

2
GHSA
GHSA-2qg7-wwhv-wp5v: A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 32025-05-17
CVEList
TOTOLINK A702R/A3002R/A3002RU HTTP POST Request formWirelessTbl buffer overflow2025-05-17
CVE-2025-4826 — Totolink A3002r vulnerability | cvebase