CVE-2025-6337
📋 TL;DR
A critical buffer overflow vulnerability in TOTOLINK A3002R and A3002RU routers allows remote attackers to execute arbitrary code by sending specially crafted HTTP POST requests to the /boafrm/formTmultiAP endpoint. This affects devices running specific firmware versions, potentially enabling complete device compromise. Attackers can exploit this without authentication from the network.
💻 Affected Systems
- TOTOLINK A3002R
- TOTOLINK A3002RU
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full device compromise, persistence installation, network pivoting, and data exfiltration.
Likely Case
Remote code execution allowing attackers to modify device configuration, intercept traffic, or use device as botnet node.
If Mitigated
Limited impact if device is behind strict network segmentation and access controls.
🎯 Exploit Status
Public exploit code available on GitHub. Attack requires sending crafted HTTP POST request to vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Check TOTOLINK website for firmware updates. If update available, download and install via web interface: 1. Log into router admin panel 2. Navigate to System Tools > Firmware Upgrade 3. Upload new firmware file 4. Wait for reboot.
🔧 Temporary Workarounds
Disable web management interface
allTurn off HTTP/HTTPS management access if not needed
Network segmentation
allIsolate vulnerable routers in separate VLAN with strict firewall rules
🧯 If You Can't Patch
- Block external access to router management interface at network perimeter
- Implement strict network segmentation to limit lateral movement potential
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status or System Tools. If version matches affected range, device is vulnerable.
Check Version:
curl -s http://router-ip/boafrm/formSysCmd | grep -i version (if accessible)
Verify Fix Applied:
Verify firmware version has been updated to a version not in affected range.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /boafrm/formTmultiAP with unusual submit-url parameter length
- Device reboot or crash logs following HTTP requests
Network Indicators:
- HTTP traffic to router IP on port 80/443 with POST to /boafrm/formTmultiAP
- Unusual outbound connections from router after exploitation
SIEM Query:
source="router_logs" AND (uri="/boafrm/formTmultiAP" OR method="POST" AND uri CONTAINS "formTmultiAP")