TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    03 Apr 2025, 15:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_gw.md - Broken Link | |
| CPE | cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:* | |
| First Time | Totolink a3002r Firmware Totolink a3002r Totolink | 
05 Mar 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.0 | 
| Summary | 
 | |
| CWE | CWE-120 | 
28 Feb 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-28 19:15
Updated : 2025-04-03 15:37
NVD link : CVE-2025-25610
Mitre link : CVE-2025-25610
CVE.ORG link : CVE-2025-25610
JSON object : View
Products Affected
                totolink
- a3002r
- a3002r_firmware
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
