First published: Sat May 17 2025(Updated: )
A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615 and classified as critical. This issue affects some unknown processing of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A702r Firmware | ||
Totolink A3002r Firmware | ||
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4833 is classified as a critical vulnerability.
CVE-2025-4833 affects the TOTOLINK A702R, A3002R, and A3002RU devices.
To fix CVE-2025-4833, it is recommended to update the affected device firmware to the latest version provided by TOTOLINK.
CVE-2025-4833 impacts the HTTP POST Request Handler component of the affected devices.
The vulnerability in CVE-2025-4833 can be exploited through manipulation of the 'submit-url' argument in the '/boafrm/formNtp' file.