CVE-2025-5507

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component MAC Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_Mac_filtering Exploit Third Party Advisory
https://vuldb.com/?ctiid.310921 Permissions Required VDB Entry
https://vuldb.com/?id.310921 Third Party Advisory VDB Entry
https://vuldb.com/?submit.584664 Third Party Advisory VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*

History

17 Jun 2025, 20:40

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 16:15

Updated : 2025-06-17 20:40


NVD link : CVE-2025-5507

Mitre link : CVE-2025-5507

CVE.ORG link : CVE-2025-5507


JSON object : View

Products Affected

totolink

  • a3002ru_firmware
  • a3002ru
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')