CVE-2025-8140Improper Restriction of Operations within the Bounds of a Memory Buffer in A702r

Severity
7.4HIGHNVD
EPSS
0.6%
top 31.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25

Description

A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formWlanMultipleAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/a702r4.0.0-B20230721.1521
NVDtotolink/a702r_firmware4.0.0-b20230721.1521

🔴Vulnerability Details

2
CVEList
TOTOLINK A702R HTTP POST Request formWlanMultipleAP buffer overflow2025-07-25
GHSA
GHSA-4g9q-w72v-3543: A vulnerability was found in TOTOLINK A702R 42025-07-25

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink formWlanMultipleAP submit-url Parameter Buffer Overflow Attempt (CVE-2025-8140)2025-07-25

📋Vendor Advisories

1
Microsoft
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the un2020-01-14