Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3264-h8mv-qcrp

Опубликовано: 17 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 52%
0.00295
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
9 месяцев назад

A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
9 месяцев назад

Уязвимость файла /boafrm/formWsc компонента HTTP POST Request Handler микропрограммного обеспечения роутеров TOTOLINK A702R, A3002R и A3002RU, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 52%
0.00295
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120