TOTOLINK N302R Plus ଯେପର୍ଯ୍ୟନ୍ତ 3.4.0-B20201028 HTTP POST Request /boafrm/formFilter url ବଫର୍ ଓଭରଫ୍ଲୋ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu TOTOLINK N302R Plus ଯେପର୍ଯ୍ୟନ୍ତ 3.4.0-B20201028 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii /boafrm/formFilter keessa kutaa HTTP POST Request Handler keessa. Dhugumatti jijjiirraa irratti raawwatame url gara ବଫର୍ ଓଭରଫ୍ଲୋ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-120 si geessa. Beekumsi kun yeroo 06/04/2025 ifoomsifameera. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-5672 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

2 ଆଡାପ୍ଟେସନ୍ · 57 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
06/04/2025 03:01 PM
ଅଦ୍ୟତନ 1/1
06/06/2025 04:25 AM
software_vendorTOTOLINKTOTOLINK
software_nameN302R PlusN302R Plus
software_version<=3.4.0-B20201028<=3.4.0-B20201028
software_componentHTTP POST Request HandlerHTTP POST Request Handler
software_file/boafrm/formFilter/boafrm/formFilter
software_argumenturlurl
vulnerability_cweCWE-120 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-120 (ବଫର୍ ଓଭରଫ୍ଲୋ)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cHH
cvss3_vuldb_iHH
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/byxs0x0/cve2/blob/main/530/2.mdhttps://github.com/byxs0x0/cve2/blob/main/530/2.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/byxs0x0/cve2/blob/main/530/2.mdhttps://github.com/byxs0x0/cve2/blob/main/530/2.md
source_cveCVE-2025-5672CVE-2025-5672
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciCC
cvss2_vuldb_iiCC
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcHH
cvss4_vuldb_viHH
cvss4_vuldb_vaHH
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore9.09.0
cvss2_vuldb_tempscore7.77.7
cvss3_vuldb_basescore8.88.8
cvss3_vuldb_tempscore8.08.0
cvss3_meta_basescore8.88.8
cvss3_meta_tempscore8.08.0
cvss4_vuldb_bscore8.78.7
cvss4_vuldb_btscore7.47.4
advisory_date1748988000 (06/04/2025)1748988000 (06/04/2025)
price_0day$0-$5k$0-$5k
euvd_idEUVD-2025-17014

Might our Artificial Intelligence support you?

Check our Alexa App!