A3002ru Firmware Totolink A3002ru Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink A3002ru Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Totolink A3002ru Firmware. Last year, in 2025 A3002ru Firmware had 8 security vulnerabilities published. Right now, A3002ru Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 8 6.48
2024 1 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 1 0.00

It may take a day or so for new A3002ru Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink A3002ru Firmware Security Vulnerabilities

TOTOLINK A3002RU 3.0.0 remote buffer overflow via HTTP POST submit-url
CVE-2025-6953 8.8 - High - July 01, 2025

A vulnerability, which was classified as critical, was found in TOTOLINK A3002RU 3.0.0-B20230809.1615. Affected is an unknown function of the file /boafrm/formParentControl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

TOTOLINK A3002RU 3.0.0-B20230809.1615 Remote BOF via submit-url (HTTP POST)
CVE-2025-6939 8.8 - High - July 01, 2025

A vulnerability classified as critical has been found in TOTOLINK A3002RU 3.0.0-B20230809.1615. Affected is an unknown function of the file /boafrm/formWlSiteSurvey of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

Totolink A3002RU 3.0.0-B20230809.1615 POST Buffer Overflow via submit-url
CVE-2025-6163 8.8 - High - June 17, 2025

A vulnerability was found in TOTOLINK A3002RU 3.0.0-B20230809.1615 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

Totolink A3002RU 3.0.0-B20230809.1615 Buffer Overflow submit-url in HTTP POST
CVE-2025-6148 8.8 - High - June 17, 2025

A vulnerability was found in TOTOLINK A3002RU 3.0.0-B20230809.1615. It has been rated as critical. This issue affects some unknown processing of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

TOTOLINK A3002RU 2.1.1 IP Port Filtering XSS Remote
CVE-2025-5508 3.4 - Low - June 03, 2025

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

XSS

XSS in TOTOLINK A3002RU MAC Filtering Page Comment (v2.1.1-B20230720.1011)
CVE-2025-5507 5.4 - Medium - June 03, 2025

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component MAC Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

XSS

TOTOLINK A3002RU 2.1.1-B20230720.1011 NAT XSS via Comment Arg
CVE-2025-5506 5.4 - Medium - June 03, 2025

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been classified as problematic. Affected is an unknown function of the component NAT Mapping Page. The manipulation of the argument Comment leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

XSS

XSS in TOTOLINK A3002RU 2.1.1 Virtual Server Page via service_type
CVE-2025-5505 2.4 - Low - June 03, 2025

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011 and classified as problematic. This issue affects some unknown processing of the file /boafrm/formPortFw of the component Virtual Server Page. The manipulation of the argument service_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

XSS

TOTOLINK AC1200 A3002RU V2.1.1 Buffer Overflow in formWlEncrypt CGI
CVE-2024-34198 - August 28, 2024

TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.

On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands
CVE-2019-19824 - January 27, 2020

On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink A3002ru Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe