First published: Wed Apr 23 2025(Updated: )
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TOTOLINK A830R | ||
TOTOlink A950RG | ||
Totolink A3000RU firmware | ||
Totolink A3100R Firmware | ||
All of | ||
Totolink A3300r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLINK A830R | ||
All of | ||
TOTOlink A950RG | =4.1.2cu.5161_b20200903 | |
TOTOlink A950RG | ||
All of | ||
Totolink A3000RU Firmware | =5.9c.5185_b20201128 | |
Totolink A3000RU firmware | ||
All of | ||
Totolink A3100R | =4.1.2cu.5247_b20211129 | |
Totolink A3100R Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-28025 has been classified with a high severity level due to its potential to allow remote code execution through buffer overflow.
To fix CVE-2025-28025, update your TOTOLINK A830R, A950RG, A3000RU, or A3100R firmware to the latest version provided by the vendor.
The affected products include TOTOLINK A830R, A950RG, A3000RU, and A3100R routers.
CVE-2025-28025 allows attackers to exploit the vulnerability in downloadFile.cgi via the v14 parameter to cause a buffer overflow.
Currently, the recommended action is to apply the firmware update as there are no effective workarounds to mitigate CVE-2025-28025.