CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability classified as critical has been found in TOTOLINK A3002R 4.0.0-B20230531.1404. Affected is an unknown function of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK A3002R firmware version 4.0.0-B20230531.1404 affecting the HTTP POST request handler for the /boafrm/formSysLog endpoint. An authenticated attacker can exploit the 'submit-url' parameter to trigger a buffer overflow, achieving remote code execution with high confidentiality, integrity, and availability impact. The vulnerability has public exploit code available and represents an active threat to deployed devices.
Technical Context
The vulnerability exists in the HTTP POST request handler component of TOTOLINK's web-based management interface, specifically in the /boafrm/formSysLog file which processes system logging configuration requests. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating insufficient input validation on the 'submit-url' parameter before it is written to a fixed-size buffer. This classic buffer overflow condition allows an attacker to overflow the allocated memory region, potentially overwriting adjacent stack or heap memory. The affected device is the TOTOLINK A3002R wireless router, a consumer-grade networking device that exposes this vulnerable endpoint through its embedded web management interface.
Affected Products
TOTOLINK A3002R (['4.0.0-B20230531.1404'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18454