Severity
7.4HIGH
EPSS
0.4%
top 40.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25

Description

A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been classified as critical. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/a702r4.0.0-B20230721.1521
NVDtotolink/a702r_firmware4.0.0-b20230721.1521

🔴Vulnerability Details

2
CVEList
TOTOLINK A702R HTTP POST Request formPortFw buffer overflow2025-07-25
GHSA
GHSA-862h-mghm-42j7: A vulnerability was found in TOTOLINK A702R 42025-07-25

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink formPortFw service_type Parameter Buffer Overflow Attempt (CVE-2025-3988, CVE-2025-8139)2025-05-08

📋Vendor Advisories

1
Microsoft
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip 2020-01-14
CVE-2025-8139 (HIGH CVSS 7.4) | A vulnerability was found in TOTOLI | cvebase.io