Severity
7.4HIGH
EPSS
0.4%
top 37.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 25
Latest updateJul 8

Description

A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/a702r4.0.0-B20230721.1521
NVDtotolink/a702r_firmware4.0.0-b20230721.1521

🔴Vulnerability Details

2
GHSA
GHSA-p76p-cppc-v4xr: A vulnerability has been found in TOTOLINK A702R 42025-06-26
CVEList
TOTOLINK A702R HTTP POST Request formIpv6Setup buffer overflow2025-06-25

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink X15 formIPv6Addr submit-url Parameter Buffer Overflow Attempt (CVE-2025-6627)2025-07-08
CVE-2025-6627 (HIGH CVSS 7.4) | A vulnerability has been found in T | cvebase.io