Buffer Overflow Vulnerability in TOTOLINK A702R, A3002R, and A3002RU Products
CVE-2025-4826

8.7HIGH

Key Information:

Vendor

Totolink

Vendor
CVE Published:
17 May 2025

Badges

👾 Exploit Exists

What is CVE-2025-4826?

A significant security flaw has been identified in certain TOTOLINK router models, where improper handling of HTTP POST requests can cause a buffer overflow. This vulnerability, linked to the 'submit-url' parameter in the /boafrm/formWirelessTbl component, exposes affected devices to the risk of remote attacks. As the exploit is public knowledge, immediate action is necessary to safeguard network security and prevent unauthorized access.

Affected Version(s)

A3002R 3.0.0-B20230809.1615

A3002RU 3.0.0-B20230809.1615

A702R 3.0.0-B20230809.1615

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

BabyShark (VulDB User)
.
CVE-2025-4826 : Buffer Overflow Vulnerability in TOTOLINK A702R, A3002R, and A3002RU Products