ID

VAR-202509-0003


CVE

CVE-2025-9779


TITLE

TOTOLINK A702R sub_4162DC function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-20788

DESCRIPTION

A vulnerability was detected in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this vulnerability is the function sub_4162DC of the file /boafrm/formFilter. The manipulation of the argument ip6addr results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service

Trust: 1.44

sources: NVD: CVE-2025-9779 // CNVD: CNVD-2025-20788

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20788

AFFECTED PRODUCTS

vendor:totolinkmodel:a702rscope:eqversion:4.0.0-b20211108.1423

Trust: 1.0

vendor:totolinkmodel:a702r 4.0.0-b20211108.1423scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-20788 // NVD: CVE-2025-9779

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-9779
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-20788
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-9779
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-20788
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-9779
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-20788 // NVD: CVE-2025-9779

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-9779

EXTERNAL IDS

db:NVDid:CVE-2025-9779

Trust: 1.6

db:VULDBid:322081

Trust: 1.0

db:CNVDid:CNVD-2025-20788

Trust: 0.6

sources: CNVD: CNVD-2025-20788 // NVD: CVE-2025-9779

REFERENCES

url:https://vuldb.com/?submit.640987

Trust: 1.0

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md#poc

Trust: 1.0

url:https://vuldb.com/?id.322081

Trust: 1.0

url:https://www.totolink.net/

Trust: 1.0

url:https://vuldb.com/?ctiid.322081

Trust: 1.0

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-9779

Trust: 0.6

sources: CNVD: CNVD-2025-20788 // NVD: CVE-2025-9779

SOURCES

db:CNVDid:CNVD-2025-20788
db:NVDid:CVE-2025-9779

LAST UPDATE DATE

2025-09-10T23:33:28.374000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-20788date:2025-09-09T00:00:00
db:NVDid:CVE-2025-9779date:2025-09-04T16:42:59.583

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-20788date:2025-09-08T00:00:00
db:NVDid:CVE-2025-9779date:2025-09-01T13:15:33.730