Home

Description

EN DE

A vulnerability was detected in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this vulnerability is the function sub_4162DC of the file /boafrm/formFilter. The manipulation of the argument ip6addr results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

Es wurde eine Schwachstelle in TOTOLINK A702R 4.0.0-B20211108.1423 entdeckt. Betroffen ist die Funktion sub_4162DC der Datei /boafrm/formFilter. Die Manipulation des Arguments ip6addr führt zu buffer overflow. Es ist möglich, den Angriff aus der Ferne durchzuführen. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden.

PUBLISHED Reserved 2025-09-01 | Published 2025-09-01 | Updated 2025-09-02 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

4.0.0-B20211108.1423
affected

Timeline

2025-09-01:Advisory disclosed
2025-09-01:VulDB entry created
2025-09-01:VulDB entry last update

Credits

rew1X (VulDB User) reporter

References

vuldb.com/?id.322081 (VDB-322081 | TOTOLINK A702R formFilter sub_4162DC buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.322081 (VDB-322081 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.640987 (Submit #640987 | TOTOLINK A720R V4.0.0-B20211108.1423 Buffer Overflow) third-party-advisory

github.com/...b/main/TOTOLINK/A702R/formFilter/formFilter.md related

github.com/...b/main/TOTOLINK/A702R/formFilter/formFilter.md exploit

www.totolink.net/ product

cve.org (CVE-2025-9779)

nvd.nist.gov (CVE-2025-9779)

Download JSON