Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-4823


A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is the function submit-url of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.


Published

2025-05-17T10:15:21.023

Last Modified

2025-05-23T15:48:37.327

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119
    CWE-120
  • Type: Primary
    CWE-120

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System totolink a702r_firmware 3.0.0-b20230809.1615 Yes
Hardware totolink a702r - No
Operating System totolink a3002r_firmware 3.0.0-b20230809.1615 Yes
Hardware totolink a3002r - No
Operating System totolink a3002ru_firmware 3.0.0-b20230809.1615 Yes
Hardware totolink a3002ru - No

References