CVE-2025-6953

8.8 HIGH

📋 TL;DR

This critical vulnerability in TOTOLINK A3002RU routers allows remote attackers to execute arbitrary code via a buffer overflow in the HTTP POST request handler. Attackers can exploit this by manipulating the submit-url parameter in the /boafrm/formParentControl endpoint. All users running the affected firmware version are at risk.

💻 Affected Systems

Products:
  • TOTOLINK A3002RU
Versions: 3.0.0-B20230809.1615
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface which is typically enabled by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistence, lateral movement, and data exfiltration

🟠

Likely Case

Remote code execution allowing attackers to take control of the router, modify configurations, intercept traffic, or launch further attacks

🟢

If Mitigated

Limited impact if device is behind firewall with restricted HTTP access and proper network segmentation

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests without authentication
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network-adjacent attacker

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub, making exploitation straightforward for attackers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor TOTOLINK official website for firmware updates
2. Download and verify the latest firmware
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply the patched firmware
6. Reboot the router

🔧 Temporary Workarounds

Disable web management interface

all

Disable the HTTP web interface to prevent exploitation

Access router CLI via SSH/Telnet
Disable HTTP service in configuration

Restrict network access

linux

Limit access to router management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict access controls
  • Implement network monitoring for exploitation attempts and anomalous HTTP requests

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at http://router-ip/ or using CLI command 'cat /proc/version'

Check Version:

ssh admin@router-ip 'cat /proc/version' or check web interface System Status page

Verify Fix Applied:

Verify firmware version has been updated to a version later than 3.0.0-B20230809.1615

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /boafrm/formParentControl
  • Large submit-url parameter values
  • Router crash/restart logs

Network Indicators:

  • HTTP requests with abnormally long submit-url parameters
  • Traffic to router management interface from unexpected sources

SIEM Query:

source="router_logs" AND (uri="/boafrm/formParentControl" AND method="POST" AND content_length>1000)

🔗 References

📤 Share & Export