A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
2025-05-17T20:15:19.397
2025-05-23T15:50:01.543
Analyzed
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | totolink | a702r_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a702r | - | No |
Operating System | totolink | a3002r_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002r | - | No |
Operating System | totolink | a3002ru_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002ru | - | No |