Listen to this Post
How the CVE Works
CVE-2025-6163 is a critical buffer overflow vulnerability in TOTOLINK A3002RU firmware version 3.0.0-B20230809.1615. The flaw resides in the `/boafrm/formMultiAP` endpoint, which handles HTTP POST requests. By manipulating the `submit-url` argument, an attacker can trigger a buffer overflow due to improper input validation. This allows remote code execution (RCE) since the overflow corrupts memory and can overwrite return addresses. The exploit is remotely exploitable, and public disclosures indicate active weaponization.
DailyCVE Form
Platform: TOTOLINK A3002RU
Version: 3.0.0-B20230809.1615
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/23/2025
Prediction: Patch by 07/15/2025
What Undercode Say
curl -X POST -d "submit-url=<malicious_payload>" http://<target>/boafrm/formMultiAP
payload = "A" 1024 + "\x41\x42\x43\x44" Example overflow exploit
How Exploit
1. Craft HTTP POST request with oversized `submit-url`.
2. Overflow stack memory to hijack execution flow.
3. Deploy shellcode for RCE.
Protection from this CVE
1. Apply vendor patch.
2. Disable exposed endpoints.
3. Use network segmentation.
Impact
- Remote code execution.
- Device compromise.
- Network infiltration.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode