First published: Sat May 17 2025(Updated: )
A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A702r Firmware | ||
Totolink A3002r Firmware | ||
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4826 is classified as a critical vulnerability in TOTOLINK routers.
To fix CVE-2025-4826, update your TOTOLINK A702R, A3002R, or A3002RU firmware to the latest version released by the vendor.
CVE-2025-4826 affects TOTOLINK models A702R, A3002R, and A3002RU.
CVE-2025-4826 is a vulnerability related to the HTTP POST Request Handler on affected TOTOLINK devices.
Exploiting CVE-2025-4826 could allow attackers to manipulate sensitive settings on affected TOTOLINK routers.