A vulnerability classified as critical has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type/ip_subnet leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
2025-05-16T00:15:20.147
2025-06-20T14:09:44.427
Analyzed
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | totolink | a3002r_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002r | - | No |
Operating System | totolink | a3002ru_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002ru | - | No |