ID

VAR-202507-2551


CVE

CVE-2025-8136


TITLE

TOTOLINK  of  A702R  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-010134

DESCRIPTION

A vulnerability, which was classified as critical, was found in TOTOLINK A702R 4.0.0-B20230721.1521. Affected is an unknown function of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument ip6addr leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's Jiweng Electronics (TOTOLINK), primarily used for home network connectivity and signal coverage. An attacker could exploit this vulnerability to cause a denial of service or execute arbitrary code

Trust: 2.16

sources: NVD: CVE-2025-8136 // JVNDB: JVNDB-2025-010134 // CNVD: CNVD-2025-18346

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-18346

AFFECTED PRODUCTS

vendor:totolinkmodel:a702rscope:eqversion:4.0.0-b20230721.1521

Trust: 1.0

vendor:totolinkmodel:a702rscope:eqversion:a702r firmware 4.0.0-b20230721.1521

Trust: 0.8

vendor:totolinkmodel:a702rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a702rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a702r 4.0.0b20230721.1521scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-18346 // JVNDB: JVNDB-2025-010134 // NVD: CVE-2025-8136

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-8136
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-8136
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-010134
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-18346
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-8136
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-010134
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-18346
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-8136
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-8136
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-010134
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-18346 // JVNDB: JVNDB-2025-010134 // NVD: CVE-2025-8136 // NVD: CVE-2025-8136

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-010134 // NVD: CVE-2025-8136

EXTERNAL IDS

db:NVDid:CVE-2025-8136

Trust: 3.2

db:VULDBid:317532

Trust: 2.4

db:JVNDBid:JVNDB-2025-010134

Trust: 0.8

db:CNVDid:CNVD-2025-18346

Trust: 0.6

sources: CNVD: CNVD-2025-18346 // JVNDB: JVNDB-2025-010134 // NVD: CVE-2025-8136

REFERENCES

url:https://vuldb.com/?id.317532

Trust: 2.4

url:https://vuldb.com/?submit.620482

Trust: 2.4

url:https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formfilter.md

Trust: 2.4

url:https://www.totolink.net/

Trust: 2.4

url:https://vuldb.com/?ctiid.317532

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2025-8136

Trust: 0.8

sources: CNVD: CNVD-2025-18346 // JVNDB: JVNDB-2025-010134 // NVD: CVE-2025-8136

SOURCES

db:CNVDid:CNVD-2025-18346
db:JVNDBid:JVNDB-2025-010134
db:NVDid:CVE-2025-8136

LAST UPDATE DATE

2025-08-15T23:10:32.974000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-18346date:2025-08-13T00:00:00
db:JVNDBid:JVNDB-2025-010134date:2025-07-29T05:48:00
db:NVDid:CVE-2025-8136date:2025-07-28T13:11:40.440

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-18346date:2025-08-05T00:00:00
db:JVNDBid:JVNDB-2025-010134date:2025-07-29T00:00:00
db:NVDid:CVE-2025-8136date:2025-07-25T07:15:28.083