CVE-2025-6164
📋 TL;DR
A critical buffer overflow vulnerability in TOTOLINK A3002R routers allows remote attackers to execute arbitrary code by sending specially crafted HTTP POST requests to the /boafrm/formMultiAP endpoint. This affects users of TOTOLINK A3002R routers running firmware version 4.0.0-B20230531.1404, potentially enabling complete device compromise.
💻 Affected Systems
- TOTOLINK A3002R
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full router compromise, credential theft, network traffic interception, and lateral movement into connected networks.
Likely Case
Router takeover enabling DNS hijacking, credential harvesting, and persistent backdoor installation.
If Mitigated
Limited impact if device is behind firewall with restricted HTTP access and network segmentation.
🎯 Exploit Status
Public proof-of-concept code is available, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
Check TOTOLINK official website for firmware updates. If available, download and install the latest firmware through the router's web interface.
🔧 Temporary Workarounds
Disable web interface access
linuxBlock external and internal access to the router's web management interface
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Network segmentation
allIsolate the router on a separate VLAN with restricted access
🧯 If You Can't Patch
- Replace affected devices with patched or alternative models
- Implement strict network access controls to limit who can reach the router's management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface at 192.168.0.1 or 192.168.1.1, login and navigate to System Status or About page.
Check Version:
curl -s http://router-ip/ | grep -i firmware || ssh admin@router-ip 'cat /proc/version'
Verify Fix Applied:
Verify firmware version is newer than 4.0.0-B20230531.1404 and test if the /boafrm/formMultiAP endpoint still accepts malformed POST requests.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /boafrm/formMultiAP with long submit-url parameters
- Router crash/restart logs
- Unusual process execution in router logs
Network Indicators:
- HTTP POST requests to /boafrm/formMultiAP with abnormally long submit-url parameters
- Unexpected outbound connections from router
SIEM Query:
source="router_logs" AND (uri="/boafrm/formMultiAP" AND method="POST" AND content_length>1000)