ID

VAR-202506-1121


CVE

CVE-2025-6393


TITLE

plural  TOTOLINK  Classic buffer overflow vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462

DESCRIPTION

A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. A3002RU firmware, A3002R firmware, A702R firmware etc. TOTOLINK The product contains a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2025-6393 // JVNDB: JVNDB-2025-008462

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1200tscope:eqversion:4.1.2cu.5232_b20210713

Trust: 1.0

vendor:totolinkmodel:a702rscope:eqversion:4.0.0-b20230721.1521

Trust: 1.0

vendor:totolinkmodel:a3002rscope:eqversion:4.0.0-b20230531.1404

Trust: 1.0

vendor:totolinkmodel:a3002ruscope:eqversion:3.0.0-b20230809.1615

Trust: 1.0

vendor:totolinkmodel:a702rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a3002ruscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1200tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462 // NVD: CVE-2025-6393

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-6393
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-6393
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-008462
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2025-6393
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-008462
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2025-6393
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-6393
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-008462
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462 // NVD: CVE-2025-6393 // NVD: CVE-2025-6393

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462 // NVD: CVE-2025-6393

EXTERNAL IDS

db:NVDid:CVE-2025-6393

Trust: 2.6

db:VULDBid:313386

Trust: 1.8

db:JVNDBid:JVNDB-2025-008462

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462 // NVD: CVE-2025-6393

REFERENCES

url:https://github.com/awindog/cve/blob/main/688/15.md

Trust: 1.8

url:https://github.com/awindog/cve/blob/main/688/16.md

Trust: 1.8

url:https://vuldb.com/?id.313386

Trust: 1.8

url:https://vuldb.com/?submit.597565

Trust: 1.8

url:https://vuldb.com/?submit.597566

Trust: 1.8

url:https://vuldb.com/?submit.597591

Trust: 1.8

url:https://vuldb.com/?submit.597592

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.313386

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-6393

Trust: 0.8

sources: JVNDB: JVNDB-2025-008462 // NVD: CVE-2025-6393

SOURCES

db:JVNDBid:JVNDB-2025-008462
db:NVDid:CVE-2025-6393

LAST UPDATE DATE

2025-07-13T19:35:40.839000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-008462date:2025-07-11T00:57:00
db:NVDid:CVE-2025-6393date:2025-07-09T18:43:26.127

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-008462date:2025-07-11T00:00:00
db:NVDid:CVE-2025-6393date:2025-06-21T01:15:29.650