ID

VAR-202505-2316


CVE

CVE-2025-45864


TITLE

TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007216

DESCRIPTION

TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolStart parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolStart parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2025-45864 // JVNDB: JVNDB-2025-007216 // CNVD: CNVD-2025-11207

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-11207

AFFECTED PRODUCTS

vendor:totolinkmodel:a3002rscope:eqversion:4.0.0-b20230531.1404

Trust: 1.0

vendor:totolinkmodel:a3002rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope:eqversion:a3002r firmware 4.0.0-b20230531.1404

Trust: 0.8

vendor:totolinkmodel:a3002r v4.0.0-b20230531.1404scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-11207 // JVNDB: JVNDB-2025-007216 // NVD: CVE-2025-45864

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45864
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-007216
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-11207
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-11207
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45864
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-007216
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-11207 // JVNDB: JVNDB-2025-007216 // NVD: CVE-2025-45864

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007216 // NVD: CVE-2025-45864

EXTERNAL IDS

db:NVDid:CVE-2025-45864

Trust: 3.2

db:JVNDBid:JVNDB-2025-007216

Trust: 0.8

db:CNVDid:CNVD-2025-11207

Trust: 0.6

sources: CNVD: CNVD-2025-11207 // JVNDB: JVNDB-2025-007216 // NVD: CVE-2025-45864

REFERENCES

url:https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/258/ids/36.html

Trust: 2.4

url:https://github.com/jiangxiazhe/iot_hack/blob/main/totolink/a3002r/8/overflow.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-45864

Trust: 0.8

sources: CNVD: CNVD-2025-11207 // JVNDB: JVNDB-2025-007216 // NVD: CVE-2025-45864

SOURCES

db:CNVDid:CNVD-2025-11207
db:JVNDBid:JVNDB-2025-007216
db:NVDid:CVE-2025-45864

LAST UPDATE DATE

2025-06-19T23:33:17.142000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-11207date:2025-05-30T00:00:00
db:JVNDBid:JVNDB-2025-007216date:2025-06-18T07:25:00
db:NVDid:CVE-2025-45864date:2025-06-17T19:41:20.687

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-11207date:2025-05-30T00:00:00
db:JVNDBid:JVNDB-2025-007216date:2025-06-18T00:00:00
db:NVDid:CVE-2025-45864date:2025-05-13T15:15:58.733