Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vp4m-3qw3-rfpq

Опубликовано: 17 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is the function submit-url of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is the function submit-url of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 59%
0.00386
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
9 месяцев назад

A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is the function submit-url of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
9 месяцев назад

Уязвимость функции submit-url файла /boafrm/formReflashClientTbl компонента HTTP POST Request Handler микропрограммного обеспечения роутеров TOTOLINK A702R, A3002R и A3002RU, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00386
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120