First published: Sat May 17 2025(Updated: )
A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been classified as critical. Affected is an unknown function of the file /boafrm/formSetLg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A702r Firmware | ||
Totolink A3002r Firmware | ||
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4834 is classified as a critical vulnerability.
CVE-2025-4834 affects the TOTOLINK A702R, A3002R, and A3002RU routers.
To fix CVE-2025-4834, update the firmware of the affected TOTOLINK devices to the latest version.
CVE-2025-4834 exploits an issue in the HTTP POST Request Handler component of the affected devices.
The exploitation of CVE-2025-4834 can lead to a buffer overflow, compromising the affected device.