A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615/4.0.0-B20230531.1404. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formTmultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
2025-06-20T12:15:22.517
2025-08-01T22:18:15.433
Analyzed
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | totolink | a3002ru_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002ru | - | No |
Operating System | totolink | a3002r_firmware | 4.0.0-b20230531.1404 | Yes |
Hardware | totolink | a3002r | - | No |
Operating System | totolink | a3002ru_firmware | 4.0.0-b20230531.1404 | Yes |
Hardware | totolink | a3002ru | - | No |
Operating System | totolink | a3002r_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002r | - | No |