TOTOLINK A3002R, OS Command Injection, CVE-2025-6485 (Critical)

Listen to this Post

How CVE-2025-6485 Works

The vulnerability exists in the `/boafrm/formWlSiteSurvey` endpoint of TOTOLINK A3002R firmware version 1.1.1-B20200824.0128. The `formWlSiteSurvey` function improperly sanitizes user-supplied input passed through the `wlanif` parameter, allowing attackers to inject arbitrary OS commands. When malicious input is processed, the router executes these commands with root privileges due to insufficient input validation. The attack can be performed remotely without authentication, enabling complete device compromise. The vulnerability stems from directly concatenating user-controlled data into system commands without proper escaping or sanitization.

DailyCVE Form

Platform: TOTOLINK A3002R
Version: 1.1.1-B20200824
Vulnerability: OS Command Injection
Severity: Critical
Date: 06/25/2025

Prediction: Patch by 08/2025

What Undercode Say

$ nmap -p 80 --script http-vuln-cve2025-6485 <target>
$ curl -X POST -d "wlanif=$(malicious_command)" http://target/boafrm/formWlSiteSurvey

How Exploit

Remote unauthenticated RCE

Root privilege escalation

PoC publicly available

Protection from this CVE

Disable web interface

Apply firmware update

Network segmentation

Impact

Full device compromise

Network infiltration

Persistence establishment

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top