Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5929 | TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa. |
Thu, 03 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a3002r Totolink a3002r Firmware |
|
| CPEs | cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink a3002r Totolink a3002r Firmware |
Wed, 05 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Fri, 28 Feb 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-05T15:43:58.613Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25610
Updated: 2025-03-05T15:43:42.316Z
Status : Analyzed
Published: 2025-02-28T19:15:37.107
Modified: 2025-04-03T15:37:48.043
Link: CVE-2025-25610
No data.
OpenCVE Enrichment
No data.
EUVD