Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18887 | A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Wed, 09 Jul 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a3002r Totolink a3002r Firmware Totolink a3002ru Totolink a3002ru Firmware Totolink a702r Totolink a702r Firmware Totolink ex1200t Totolink ex1200t Firmware |
|
| CPEs | cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002r_firmware:4.0.0-b20230531.1404:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002ru_firmware:3.0.0-b20230809.1615:*:*:*:*:*:*:* cpe:2.3:o:totolink:a702r_firmware:4.0.0-b20230721.1521:*:*:*:*:*:*:* cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink a3002r Totolink a3002r Firmware Totolink a3002ru Totolink a3002ru Firmware Totolink a702r Totolink a702r Firmware Totolink ex1200t Totolink ex1200t Firmware |
Mon, 23 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Jun 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | TOTOLINK A702R/A3002R/A3002RU/EX1200T HTTP POST Request formIPv6Addr buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-23T14:43:28.605Z
Reserved: 2025-06-20T05:34:04.899Z
Link: CVE-2025-6393
Updated: 2025-06-23T14:43:17.101Z
Status : Analyzed
Published: 2025-06-21T01:15:29.650
Modified: 2025-07-09T18:43:26.127
Link: CVE-2025-6393
No data.
OpenCVE Enrichment
Updated: 2025-06-23T08:17:26Z
EUVD