CVE-2025-6485
MEDIUM EXPLOITEDTotolink A3002r Firmware - Command Injection
Title source: ruleDescription
A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.313593
Permissions Required signature
permissions-required
https://vuldb.com/?ctiid.313593
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.600727
Exploit, Third Party Advisory exploit
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md
Product product
https://www.totolink.net/
Scores
CVSS v3
6.3
EPSS
0.0844
EPSS Percentile
92.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
VulnCheck KEV
2026-01-22
CWE
CWE-77
CWE-78
Status
published
Products (1)
totolink/a3002r_firmware
1.1.1-b20200824.0128
Published
Jun 22, 2025
Tracked Since
Feb 18, 2026