Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cq5p-gh3j-rmpx

Опубликовано: 17 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

A vulnerability has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 44%
0.00216
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
9 месяцев назад

A vulnerability has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
9 месяцев назад

Уязвимость компонента HTTP POST Request Handler файла /boafrm/formDosCfg микропрограммного обеспечения роутеров A702R, A3002R и A3002RU, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 44%
0.00216
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120