Логотип exploitDog
bind:CVE-2025-6486
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6486

Количество 3

Количество 3

nvd логотип

CVE-2025-6486

2 месяца назад

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fmh2-32mp-xrcx

2 месяца назад

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-07639

2 месяца назад

Уязвимость функции formWlanMultipleAP микропрограммного обеспечения роутера Totolink A3002R, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6486

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
2 месяца назад
github логотип
GHSA-fmh2-32mp-xrcx

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
2 месяца назад
fstec логотип
BDU:2025-07639

Уязвимость функции formWlanMultipleAP микропрограммного обеспечения роутера Totolink A3002R, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу