Home

Description

EN DE

A vulnerability has been found in TOTOLINK A702R 4.0.0-B20211108.1423. This affects the function sub_4162DC of the file /boafrm/formFilter. Such manipulation of the argument ip6addr leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

In TOTOLINK A702R 4.0.0-B20211108.1423 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist die Funktion sub_4162DC der Datei /boafrm/formFilter. Die Bearbeitung des Arguments ip6addr verursacht buffer overflow. Der Angriff kann remote ausgeführt werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden.

PUBLISHED Reserved 2025-09-01 | Published 2025-09-01 | Updated 2025-09-02 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

4.0.0-B20211108.1423
affected

Timeline

2025-09-01:Advisory disclosed
2025-09-01:VulDB entry created
2025-09-01:VulDB entry last update

Credits

rew1X (VulDB User) reporter

References

vuldb.com/?id.322083 (VDB-322083 | TOTOLINK A702R formFilter sub_4162DC buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.322083 (VDB-322083 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.640989 (Submit #640989 | TOTOLINK A702R V4.0.0-B20211108.1423 Buffer Overflow) third-party-advisory

github.com/...b/main/TOTOLINK/A702R/formFilter/formFilter.md related

github.com/...b/main/TOTOLINK/A702R/formFilter/formFilter.md exploit

www.totolink.net/ product

cve.org (CVE-2025-9781)

nvd.nist.gov (CVE-2025-9781)

Download JSON