First published: Fri Feb 28 2025(Updated: )
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25635 is classified as a high severity vulnerability due to the potential for buffer overflow exploitation.
To fix CVE-2025-25635, you should update the TOTOlink A3002R firmware to the latest version that addresses this buffer overflow vulnerability.
The impact of CVE-2025-25635 could lead to remote code execution or denial of service if exploited by an attacker.
CVE-2025-25635 affects the TOTOlink A3002R router with the firmware version V1.1.1-B20200824.0128.
Attackers can exploit CVE-2025-25635 by sending crafted requests with specially formatted pppoe_dns1 parameters to the vulnerable interface.