A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
2025-06-21T01:15:29.650
2025-07-09T18:43:26.127
Analyzed
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | totolink | a3002ru_firmware | 3.0.0-b20230809.1615 | Yes |
Hardware | totolink | a3002ru | - | No |
Operating System | totolink | a3002r_firmware | 4.0.0-b20230531.1404 | Yes |
Hardware | totolink | a3002r | - | No |
Operating System | totolink | a702r_firmware | 4.0.0-b20230721.1521 | Yes |
Hardware | totolink | a702r | - | No |
Operating System | totolink | ex1200t_firmware | 4.1.2cu.5232_b20210713 | Yes |
Hardware | totolink | ex1200t | - | No |