Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qg7-wwhv-wp5v

Опубликовано: 17 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 59%
0.00386
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
9 месяцев назад

A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
9 месяцев назад

Уязвимость компонента HTTP POST Request Handler файла /boafrm/formWirelessTbl микропрограммного обеспечения роутеров A702R, A3002R и A3002RU, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 59%
0.00386
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120