TOTOLINK A702R/A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formSaveConfig submit-url Pufferüberlauf
Wuro vulnerability wey an yi classify sey kura an gano shi a cikin TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /boafrm/formSaveConfig na cikin fayil, HTTP POST Request Handler na cikin sashi. Ngam manipulation of the argument submit-url shi Pufferüberlauf. CWE shidin ka a yi bayani matsala sai ya kai CWE-120. Gaskiya, laifi an fitar da shi 05/16/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-4827. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.
4 Goyarwa · 88 Datenpunkte