TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa.
References
Configurations
Configuration 1 (hide)
AND |
|
History
03 Apr 2025, 15:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Totolink a3002r Firmware
Totolink a3002r Totolink |
|
CPE | cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:* |
|
References | () https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_gw.md - Broken Link |
05 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
Summary |
|
|
CWE | CWE-120 |
28 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-28 19:15
Updated : 2025-04-03 15:37
NVD link : CVE-2025-25610
Mitre link : CVE-2025-25610
CVE.ORG link : CVE-2025-25610
JSON object : View
Products Affected
totolink
- a3002r_firmware
- a3002r
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')