CVE-2025-4731

HIGH

Totolink A3002r Firmware - Memory Corruption

Title source: rule
STIX 2.1

Description

A vulnerability classified as critical has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type/ip_subnet leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.309033
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.309033
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.570688
Product product
https://www.totolink.net/

Scores

CVSS v3 8.8
EPSS 0.0098
EPSS Percentile 76.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-119 CWE-120
Status published
Products (2)
totolink/a3002r_firmware 3.0.0-b20230809.1615
totolink/a3002ru_firmware 3.0.0-b20230809.1615
Published May 16, 2025
Tracked Since Feb 18, 2026