ID

VAR-202509-0003


CVE

CVE-2025-9779


TITLE

TOTOLINK  of  A702R  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-014395

DESCRIPTION

A vulnerability was detected in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this vulnerability is the function sub_4162DC of the file /boafrm/formFilter. The manipulation of the argument ip6addr results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-9779 // JVNDB: JVNDB-2025-014395 // CNVD: CNVD-2025-20788

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20788

AFFECTED PRODUCTS

vendor:totolinkmodel:a702rscope:eqversion:4.0.0-b20211108.1423

Trust: 1.0

vendor:totolinkmodel:a702rscope:eqversion:a702r firmware 4.0.0-b20211108.1423

Trust: 0.8

vendor:totolinkmodel:a702rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a702rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a702r 4.0.0-b20211108.1423scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-20788 // JVNDB: JVNDB-2025-014395 // NVD: CVE-2025-9779

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-9779
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-014395
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-20788
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-9779
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-014395
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-20788
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-9779
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-014395
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-20788 // JVNDB: JVNDB-2025-014395 // NVD: CVE-2025-9779

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-014395 // NVD: CVE-2025-9779

EXTERNAL IDS

db:NVDid:CVE-2025-9779

Trust: 3.2

db:VULDBid:322081

Trust: 1.8

db:JVNDBid:JVNDB-2025-014395

Trust: 0.8

db:CNVDid:CNVD-2025-20788

Trust: 0.6

sources: CNVD: CNVD-2025-20788 // JVNDB: JVNDB-2025-014395 // NVD: CVE-2025-9779

REFERENCES

url:https://vuldb.com/?id.322081

Trust: 1.8

url:https://vuldb.com/?submit.640987

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-9779

Trust: 1.4

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md#poc

Trust: 1.0

url:https://vuldb.com/?ctiid.322081

Trust: 1.0

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md

Trust: 1.0

sources: CNVD: CNVD-2025-20788 // JVNDB: JVNDB-2025-014395 // NVD: CVE-2025-9779

SOURCES

db:CNVDid:CNVD-2025-20788
db:JVNDBid:JVNDB-2025-014395
db:NVDid:CVE-2025-9779

LAST UPDATE DATE

2025-09-26T23:50:50.852000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-20788date:2025-09-09T00:00:00
db:JVNDBid:JVNDB-2025-014395date:2025-09-24T09:03:00
db:NVDid:CVE-2025-9779date:2025-09-04T16:42:59.583

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-20788date:2025-09-08T00:00:00
db:JVNDBid:JVNDB-2025-014395date:2025-09-24T00:00:00
db:NVDid:CVE-2025-9779date:2025-09-01T13:15:33.730