ID

VAR-202505-2329


CVE

CVE-2025-45866


TITLE

TOTOLINK  of  A3002R  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007215

DESCRIPTION

TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolEnd parameter in the formDhcpv6s interface. TOTOLINK A3002R is a wireless router from China's TOTOLINK Electronics. The vulnerability is caused by the addrPoolEnd parameter in the formDhcpv6s interface failing to correctly verify the length of the input data. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2025-45866 // JVNDB: JVNDB-2025-007215 // CNVD: CNVD-2025-11205

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-11205

AFFECTED PRODUCTS

vendor:totolinkmodel:a3002rscope:eqversion:4.0.0-b20230531.1404

Trust: 1.0

vendor:totolinkmodel:a3002rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope:eqversion:a3002r firmware 4.0.0-b20230531.1404

Trust: 0.8

vendor:totolinkmodel:a3002r v4.0.0-b20230531.1404scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-11205 // JVNDB: JVNDB-2025-007215 // NVD: CVE-2025-45866

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45866
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-007215
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-11205
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-11205
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45866
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-007215
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-11205 // JVNDB: JVNDB-2025-007215 // NVD: CVE-2025-45866

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007215 // NVD: CVE-2025-45866

EXTERNAL IDS

db:NVDid:CVE-2025-45866

Trust: 3.2

db:JVNDBid:JVNDB-2025-007215

Trust: 0.8

db:CNVDid:CNVD-2025-11205

Trust: 0.6

sources: CNVD: CNVD-2025-11205 // JVNDB: JVNDB-2025-007215 // NVD: CVE-2025-45866

REFERENCES

url:https://github.com/jiangxiazhe/iot_hack/blob/main/totolink/a3002r/9/overflow.md

Trust: 2.4

url:https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/258/ids/36.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-45866

Trust: 0.8

sources: CNVD: CNVD-2025-11205 // JVNDB: JVNDB-2025-007215 // NVD: CVE-2025-45866

SOURCES

db:CNVDid:CNVD-2025-11205
db:JVNDBid:JVNDB-2025-007215
db:NVDid:CVE-2025-45866

LAST UPDATE DATE

2025-06-19T23:40:58.975000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-11205date:2025-05-30T00:00:00
db:JVNDBid:JVNDB-2025-007215date:2025-06-18T07:25:00
db:NVDid:CVE-2025-45866date:2025-06-17T19:39:56.640

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-11205date:2025-05-30T00:00:00
db:JVNDBid:JVNDB-2025-007215date:2025-06-18T00:00:00
db:NVDid:CVE-2025-45866date:2025-05-13T15:15:58.840