TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa
References
Configurations
Configuration 1 (hide)
AND |
|
History
03 Apr 2025, 15:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Totolink a3002r Firmware
Totolink a3002r Totolink |
|
CPE | cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:* |
|
References | () https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_ipv6.md - Broken Link |
05 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
28 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-28 19:15
Updated : 2025-04-03 15:37
NVD link : CVE-2025-25609
Mitre link : CVE-2025-25609
CVE.ORG link : CVE-2025-25609
JSON object : View
Products Affected
totolink
- a3002r_firmware
- a3002r
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')