Skip to main content

CVE-2025-4835: Buffer Overflow in TOTOLINK A702R

High
VulnerabilityCVE-2025-4835cvecve-2025-4835
Published: Sat May 17 2025 (05/17/2025, 19:31:07 UTC)
Source: CVE
Vendor/Project: TOTOLINK
Product: A702R

Description

A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 19:48:04 UTC

Technical Analysis

CVE-2025-4835 is a critical buffer overflow vulnerability affecting TOTOLINK router models A702R, A3002R, and A3002RU running firmware version 3.0.0-B20230809.1615. The flaw exists in the HTTP POST request handler component, specifically in the /boafrm/formWlanRedirect endpoint. An attacker can manipulate the 'redirect-url' parameter in the POST request to trigger a buffer overflow condition. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The buffer overflow can lead to arbitrary code execution or cause the device to crash, potentially resulting in denial of service or full compromise of the router. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation and the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be active in the wild, the disclosure of the vulnerability and its exploit details increases the risk of imminent attacks. The vulnerability affects a core network device that manages traffic routing and wireless access, making it a critical point of failure in network infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. TOTOLINK routers are commonly used in small to medium enterprises and some home office environments across Europe. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially pivot to internal systems. This could lead to data breaches, disruption of business operations, and compromise of sensitive information. Critical infrastructure providers and organizations relying on these routers for secure internet access are particularly vulnerable. The lack of authentication and user interaction requirements means attackers can launch attacks remotely and at scale, increasing the threat landscape. Additionally, compromised routers could be enlisted in botnets or used to launch further attacks against European networks.

Mitigation Recommendations

Organizations should immediately verify if their TOTOLINK devices are running the affected firmware version 3.0.0-B20230809.1615. If so, they should seek firmware updates or patches from TOTOLINK as a priority. In the absence of an official patch, network administrators should restrict access to the router's management interface by implementing IP-based access controls, disabling remote management, and isolating the device from untrusted networks. Monitoring network traffic for unusual POST requests to /boafrm/formWlanRedirect can help detect exploitation attempts. Employing network intrusion detection systems (NIDS) with signatures for this vulnerability is recommended. Additionally, organizations should consider replacing vulnerable devices with models from vendors with a stronger security track record if patching is delayed. Regularly auditing router configurations and applying the principle of least privilege to network devices will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-16T14:23:51.620Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb756

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 7:48:04 PM

Last updated: 7/30/2025, 4:07:33 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats