Severity
7.4HIGH
EPSS
1.9%
top 16.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 21
Latest updateJun 23

Description

A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages8 packages

CVEListV5totolink/a3002ru4 versions+3
NVDtotolink/a3002ru_firmware3.0.0-b20230809.1615
CVEListV5totolink/a702r4 versions+3
CVEListV5totolink/a3002r4 versions+3
CVEListV5totolink/ex1200t4 versions+3

🔴Vulnerability Details

2
GHSA
GHSA-6xw8-jh6q-85g8: A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 32025-06-23
CVEList
TOTOLINK A702R/A3002R/A3002RU/EX1200T HTTP POST Request formIPv6Addr buffer overflow2025-06-21
CVE-2025-6393 (HIGH CVSS 7.4) | A vulnerability was found in TOTOLI | cvebase.io