CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A vulnerability has been found in TOTOLINK N302R Plus up to 3.4.0-B20201028 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical remote buffer overflow vulnerability in TOTOLINK N302R Plus routers up to version 3.4.0-B20201028, affecting the HTTP POST request handler in the /boafrm/formFilter endpoint. An authenticated attacker can remotely exploit this vulnerability by manipulating the 'url' parameter to achieve buffer overflow, resulting in complete compromise of confidentiality, integrity, and availability (CIA triad fully compromised). The vulnerability has public exploit disclosure and represents an active real-world threat to deployed TOTOLINK router infrastructure.
Technical Context
The vulnerability exists in the HTTP POST request handler component of TOTOLINK N302R Plus firmware, specifically in the /boafrm/formFilter endpoint. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition. The 'url' parameter passed to this endpoint lacks proper input validation and bounds checking, allowing an attacker to write arbitrary data beyond allocated buffer boundaries. This affects embedded firmware running on MIPS-based routing hardware. The vulnerability manifests in the web administrative interface, which processes form-based requests. CPE identification: cpe:2.3:o:totolink:n302r_plus_firmware:*:*:*:*:*:*:*:* (versions up to 3.4.0-B20201028).
Affected Products
N302R Plus (Up to and including 3.4.0-B20201028)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17014