First published: Fri Mar 28 2025(Updated: )
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injection in /bin/boa via bandstr.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware | ||
All of | ||
Totolink A3002R Firmware | =4.0.0-b20230531.1404 | |
Totolink A3002r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25579 has been assessed to have a high severity due to its potential for remote command execution.
To fix CVE-2025-25579, it is recommended to update the TOTOLINK A3002R firmware to the latest version that addresses this vulnerability.
CVE-2025-25579 allows for command injection attacks that could enable an attacker to execute arbitrary commands on the affected device.
CVE-2025-25579 specifically affects the TOTOLINK A3002R router running firmware versions prior to V4.0.0-B20230531.1404.
Yes, CVE-2025-25579 can be easily exploited due to weak input validation in the device's web interface.