CVE-2025-55586

7.5 HIGH

📋 TL;DR

This CVE describes a buffer overflow vulnerability in the TOTOLINK A3002R router's web interface. Attackers can send specially crafted requests to the /boafrm/formFilter endpoint to cause a denial of service, potentially crashing the device. This affects users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • TOTOLINK A3002R
Versions: v4.0.0-B20230531.1404
Operating Systems: Embedded Linux (Boa web server)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the Boa web server component used for the router's management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, potential remote code execution if the overflow can be controlled to execute arbitrary code (though not confirmed in this CVE).

🟠

Likely Case

Denial of service causing router reboot and network disruption for connected devices.

🟢

If Mitigated

No impact if the vulnerable endpoint is not accessible or the device is patched.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing, and the exploit requires no authentication.
🏢 Internal Only: LOW - The vulnerability is in the web management interface, which is typically exposed externally or on the LAN.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept is publicly available on GitHub, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

Check TOTOLINK's official website or support portal for firmware updates. If available, download the latest firmware, log into the router's web interface, navigate to the firmware upgrade section, and upload the new file.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's web interface by disabling remote management in the router settings.

Restrict LAN access

all

Use firewall rules to restrict access to the router's management interface (typically port 80/443) to trusted IP addresses only.

🧯 If You Can't Patch

  • Segment the network to isolate the router from critical systems.
  • Monitor network traffic for unusual requests to /boafrm/formFilter.

🔍 How to Verify

Check if Vulnerable:

Check the router's firmware version via the web interface (typically under System Status or similar). If it matches v4.0.0-B20230531.1404, it is vulnerable.

Check Version:

Log into the router's web interface and navigate to the system information page; no CLI command is typically available.

Verify Fix Applied:

After updating firmware, verify the version no longer matches the vulnerable version. Test by attempting to access /boafrm/formFilter with normal traffic to ensure the router remains responsive.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /boafrm/formFilter with long URL parameters
  • Router reboot logs or crash reports

Network Indicators:

  • HTTP POST requests to /boafrm/formFilter with unusually long payloads
  • Sudden loss of connectivity to the router

SIEM Query:

source="router_logs" AND url="/boafrm/formFilter" AND payload_size>1000

🔗 References

📤 Share & Export