TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa.
References
| Link | Resource |
|---|---|
| https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-pppoe_dns1.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-02-28 19:15
Updated : 2025-10-02 01:40
NVD link : CVE-2025-25635
Mitre link : CVE-2025-25635
CVE.ORG link : CVE-2025-25635
JSON object : View
Products Affected
totolink
- a3002r_firmware
- a3002r
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
