First published: Fri Feb 28 2025(Updated: )
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware | ||
All of | ||
Totolink A3002R Firmware | =1.1.1-b20200824.0128 | |
Totolink A3002r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25609 is classified as a high-severity vulnerability due to the potential for remote code execution through buffer overflow.
To mitigate CVE-2025-25609, update TOTOlink A3002R firmware to the latest version that addresses this buffer overflow vulnerability.
CVE-2025-25609 is due to a buffer overflow vulnerability caused by improper input validation of the static_ipv6 parameter in the formIpv6Setup interface.
Exploiting CVE-2025-25609 can allow attackers to execute arbitrary code or crash the firmware due to improper handling of input data.
Yes, CVE-2025-25609 specifically affects TOTOlink A3002R firmware version V1.1.1-B20200824.0128.