Количество 3
Количество 3

CVE-2025-6486
A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
GHSA-fmh2-32mp-xrcx
A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

BDU:2025-07639
Уязвимость функции formWlanMultipleAP микропрограммного обеспечения роутера Totolink A3002R, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-6486 A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 8.8 | 0% Низкий | 2 месяца назад |
GHSA-fmh2-32mp-xrcx A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
![]() | BDU:2025-07639 Уязвимость функции formWlanMultipleAP микропрограммного обеспечения роутера Totolink A3002R, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | 2 месяца назад |
Уязвимостей на страницу