First published: Sat May 17 2025(Updated: )
A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A702r Firmware | ||
Totolink A3002r Firmware | ||
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4835 has been declared as critical.
CVE-2025-4835 affects TOTOLINK A702R, A3002R, and A3002RU devices running firmware version 3.0.0-B20230809.1615.
To fix CVE-2025-4835, update the firmware of your TOTOLINK devices to the latest version provided by the vendor.
CVE-2025-4835 is a vulnerability in the HTTP POST Request Handler related to an unknown functionality.
CVE-2025-4835 could potentially allow unauthorized access or manipulation of the affected TOTOLINK devices.