ID

VAR-202509-0071


CVE

CVE-2025-9781


TITLE

TOTOLINK  of  A702R  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-013087

DESCRIPTION

A vulnerability has been found in TOTOLINK A702R 4.0.0-B20211108.1423. This affects the function sub_4162DC of the file /boafrm/formFilter. Such manipulation of the argument ip6addr leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of A702R The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK A702R is a wireless router manufactured by China's TOTOLINK Electronics, primarily used for home network connectivity and signal coverage. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service (DoS) on the system

Trust: 2.16

sources: NVD: CVE-2025-9781 // JVNDB: JVNDB-2025-013087 // CNVD: CNVD-2025-20792

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20792

AFFECTED PRODUCTS

vendor:totolinkmodel:a702rscope:eqversion:4.0.0-b20211108.1423

Trust: 1.0

vendor:totolinkmodel:a702rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a702rscope:eqversion:a702r firmware 4.0.0-b20211108.1423

Trust: 0.8

vendor:totolinkmodel:a702rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a702r 4.0.0-b20211108.1423scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-20792 // JVNDB: JVNDB-2025-013087 // NVD: CVE-2025-9781

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-9781
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-013087
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-20792
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-9781
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-013087
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-20792
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-9781
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-013087
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-20792 // JVNDB: JVNDB-2025-013087 // NVD: CVE-2025-9781

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-013087 // NVD: CVE-2025-9781

EXTERNAL IDS

db:NVDid:CVE-2025-9781

Trust: 3.2

db:VULDBid:322083

Trust: 1.8

db:JVNDBid:JVNDB-2025-013087

Trust: 0.8

db:CNVDid:CNVD-2025-20792

Trust: 0.6

sources: CNVD: CNVD-2025-20792 // JVNDB: JVNDB-2025-013087 // NVD: CVE-2025-9781

REFERENCES

url:https://vuldb.com/?id.322083

Trust: 1.8

url:https://vuldb.com/?submit.640989

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-9781

Trust: 1.4

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md#poc

Trust: 1.0

url:https://github.com/rew1x/cve/blob/main/totolink/a702r/formfilter/formfilter.md

Trust: 1.0

url:https://vuldb.com/?ctiid.322083

Trust: 1.0

sources: CNVD: CNVD-2025-20792 // JVNDB: JVNDB-2025-013087 // NVD: CVE-2025-9781

SOURCES

db:CNVDid:CNVD-2025-20792
db:JVNDBid:JVNDB-2025-013087
db:NVDid:CVE-2025-9781

LAST UPDATE DATE

2025-09-10T23:28:18.083000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-20792date:2025-09-09T00:00:00
db:JVNDBid:JVNDB-2025-013087date:2025-09-05T07:36:00
db:NVDid:CVE-2025-9781date:2025-09-04T16:42:38.633

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-20792date:2025-09-08T00:00:00
db:JVNDBid:JVNDB-2025-013087date:2025-09-05T00:00:00
db:NVDid:CVE-2025-9781date:2025-09-01T14:15:31.723