Listen to this Post
How the CVE Works
The vulnerability in TOTOLINK A3002R firmware version 1.1.1-B20200824.0128 stems from improper handling of the `submit-url` parameter in the `formWlanMultipleAP` function (/boafrm/formWlanMultipleAP
). A remote attacker can exploit this flaw by sending a crafted HTTP request containing an overly long `submit-url` value, triggering a stack-based buffer overflow. This allows arbitrary code execution under the context of the device’s web server, potentially leading to full system compromise. The exploit is remotely accessible, requiring no authentication, making it highly critical.
DailyCVE Form
Platform: TOTOLINK A3002R
Version: 1.1.1-B20200824.0128
Vulnerability: Stack overflow
Severity: Critical
Date: 06/25/2025
Prediction: Patch by 07/15/2025
What Undercode Say
curl -X POST -d "submit-url=$(python -c 'print("A"1000)')" http://<TARGET>/boafrm/formWlanMultipleAP
payload = "A" 1024 requests.post("http://<TARGET>/boafrm/formWlanMultipleAP", data={"submit-url": payload})
How Exploit
- Craft HTTP POST request with oversized
submit-url
. - Overwrite return address to hijack execution flow.
- Deploy shellcode for RCE.
Protection from this CVE
- Apply vendor patch.
- Disable WAN access.
- Use network segmentation.
Impact
- Remote code execution.
- Full device takeover.
- Network compromise.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode