TOTOLINK A3002RU, Buffer Overflow Vulnerability, CVE-2025-6163 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-6163 is a critical buffer overflow vulnerability in TOTOLINK A3002RU firmware version 3.0.0-B20230809.1615. The flaw resides in the `/boafrm/formMultiAP` endpoint, which handles HTTP POST requests. By manipulating the `submit-url` argument, an attacker can trigger a buffer overflow due to improper input validation. This allows remote code execution (RCE) since the overflow corrupts memory and can overwrite return addresses. The exploit is remotely exploitable, and public disclosures indicate active weaponization.

DailyCVE Form

Platform: TOTOLINK A3002RU
Version: 3.0.0-B20230809.1615
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 07/15/2025

What Undercode Say

curl -X POST -d "submit-url=<malicious_payload>" http://<target>/boafrm/formMultiAP
payload = "A" 1024 + "\x41\x42\x43\x44" Example overflow exploit

How Exploit

1. Craft HTTP POST request with oversized `submit-url`.

2. Overflow stack memory to hijack execution flow.

3. Deploy shellcode for RCE.

Protection from this CVE

1. Apply vendor patch.

2. Disable exposed endpoints.

3. Use network segmentation.

Impact

  • Remote code execution.
  • Device compromise.
  • Network infiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top