A3200r Firmware Totolink A3200r Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink A3200r Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Totolink A3200r Firmware. Last year, in 2025 A3200r Firmware had 3 security vulnerabilities published. Right now, A3200r Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 3 7.97

It may take a day or so for new A3200r Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink A3200r Firmware Security Vulnerabilities

TOTOLINK A3002R 1.1.1-B20200824.0128: formRoute SB-Overflow via Subnet
CVE-2025-6487 8.8 - High - June 22, 2025

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been rated as critical. This issue affects the function formRoute of the file /boafrm/formRoute. The manipulation of the argument subnet leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

Stack Overflow in TOTOLINK A3002R 1.1.1 via formWlanMultipleAP
CVE-2025-6486 8.8 - High - June 22, 2025

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared as critical. This vulnerability affects the function formWlanMultipleAP of the file /boafrm/formWlanMultipleAP. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Buffer Overflow

TOTOLINK A3002R 1.1.1 os Command Injection via formWlSiteSurvey (wlanif)
CVE-2025-6485 6.3 - Medium - June 22, 2025

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink A3200r Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe