A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 25 Jun 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3200r
Totolink a3200r Firmware
CPEs cpe:2.3:h:totolink:a3200r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3200r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3200r
Totolink a3200r Firmware

Mon, 23 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 22 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK A3002R formWlSiteSurvey os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-22T17:00:16.977Z

Updated: 2025-06-23T13:28:25.470Z

Reserved: 2025-06-21T06:02:35.419Z

Link: CVE-2025-6485

cve-icon Vulnrichment

Updated: 2025-06-23T13:28:16.565Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-22T17:15:23.043

Modified: 2025-06-25T19:31:46.050

Link: CVE-2025-6485

cve-icon Redhat

No data.