TOTOLINK A3002R

CPE Details

TOTOLINK A3002R
-
2020-12-15
01h39 +00:00
2021-06-16
15h54 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*

Informations

Vendor

totolink

Product

a3002r

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-25579 2025-03-28 00h00 +00:00 TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injection in /bin/boa via bandstr.
9.8
Critical
CVE-2025-25609 2025-02-28 00h00 +00:00 TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa
8
High
CVE-2025-25610 2025-02-28 00h00 +00:00 TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa.
8
High
CVE-2025-25635 2025-02-28 00h00 +00:00 TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa.
8
High
CVE-2024-54907 2024-12-25 23h00 +00:00 TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Remote Code Execution in /bin/boa via formWsc.
8.8
High
CVE-2024-34195 2024-08-27 22h00 +00:00 TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.
9.8
Critical
CVE-2024-42520 2024-08-11 22h00 +00:00 TOTOLINK A3002R v4.0.0-B20230531.1404 contains a buffer overflow vulnerability in /bin/boa via formParentControl.
9.8
Critical
CVE-2022-40112 2022-09-06 14h54 +00:00 TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable Buffer Overflow via the hostname parameter in binary /bin/boa.
7.5
High
CVE-2022-40111 2022-09-06 14h53 +00:00 In TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 in the shadow.sample file, root is hardcoded in the firmware.
9.8
Critical
CVE-2022-40110 2022-09-06 14h51 +00:00 TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable to Buffer Overflow via /bin/boa.
7.5
High
CVE-2022-40109 2022-09-06 14h46 +00:00 TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable to Insecure Permissions via binary /bin/boa.
9.8
Critical
CVE-2021-34228 2021-08-20 14h49 +00:00 Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field.
6.1
Medium
CVE-2021-34223 2021-08-20 14h48 +00:00 Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field.
6.1
Medium
CVE-2021-34220 2021-08-20 14h47 +00:00 Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field.
6.1
Medium
CVE-2021-34218 2021-08-20 14h46 +00:00 Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter.
5.3
Medium
CVE-2021-34215 2021-08-20 14h44 +00:00 Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field.
6.1
Medium
CVE-2021-34207 2021-08-20 14h43 +00:00 Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Domain Name" field, "Server Address" field, "User Name/Email", or "Password/Key" field.
6.1
Medium
CVE-2020-25499 2020-12-09 19h30 +00:00 TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.
8.8
High