Unrated severityNVD Advisory· Published May 17, 2025· Updated May 19, 2025
TOTOLINK A702R/A3002R/A3002RU HTTP POST Request formWlanRedirect buffer overflow
CVE-2025-4835
Description
A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Affected products
5- TOTOLINK/A3002Rv5Range: 3.0.0-B20230809.1615
- TOTOLINK/A3002RUv5Range: 3.0.0-B20230809.1615
- TOTOLINK/A702Rv5Range: 3.0.0-B20230809.1615
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/CH13hh/tmp_store_cc/blob/main/toto/13.mdmitrebroken-linkexploit
- vuldb.commitrethird-party-advisory
- vuldb.commitresignaturepermissions-required
- vuldb.commitrevdb-entrytechnical-description
- www.totolink.netmitreproduct
News mentions
0No linked articles in our index yet.