First published: Fri Feb 28 2025(Updated: )
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25610 is classified as a high severity vulnerability due to its potential for remote code execution via buffer overflow.
To mitigate CVE-2025-25610, update the firmware of TOTOlink A3002R to the latest version that addresses this vulnerability.
CVE-2025-25610 is caused by improper input validation of the static_gw parameter in the formIpv6Setup interface.
The potential impacts of CVE-2025-25610 include unauthorized access, system exploitation, and loss of data integrity.
CVE-2025-25610 specifically affects the TOTOlink A3002R router running firmware version V1.1.1-B20200824.0128.