TOTOLINK A702R, Buffer Overflow Vulnerability, CVE-2025-6147 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-6147 is a critical buffer overflow vulnerability in TOTOLINK A702R firmware version 4.0.0-B20230721.1521. The flaw resides in the `/boafrm/formSysLog` endpoint, which handles HTTP POST requests. By manipulating the `submit-url` argument, an attacker can trigger a buffer overflow due to insufficient input validation. This allows remote code execution (RCE) with elevated privileges. The exploit is publicly available, increasing the risk of widespread attacks.

DailyCVE Form

Platform: TOTOLINK A702R
Version: 4.0.0-B20230721.1521
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/23/2025

Prediction: Patch expected by 07/15/2025

What Undercode Say

curl -X POST -d "submit-url=<malicious_payload>" http://<target_ip>/boafrm/formSysLog
payload = "A" 1024 Overflow trigger
requests.post(f"http://{target}/boafrm/formSysLog", data={"submit-url": payload})

How Exploit

  • Craft a malicious HTTP POST request with an oversized `submit-url` value.
  • Exploit leads to arbitrary code execution on the device.
  • No authentication required for exploitation.

Protection from this CVE

  • Apply vendor firmware updates immediately.
  • Disable remote management if unused.
  • Implement network segmentation.

Impact

  • Full device compromise.
  • Unauthorized access to network.
  • Potential botnet recruitment.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top