CVE-2025-4852

A vulnerability, which was classified as problematic, has been found in TOTOLINK A3002R 2.1.1-B20230720.1011. This issue affects some unknown processing of the component VPN Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002r_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*

History

04 Jun 2025, 20:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.4
First Time Totolink a3002r Firmware
Totolink a3002r
Totolink
CWE CWE-79
CPE cpe:2.3:o:totolink:a3002r_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*
References () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_VPN - () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_VPN - Exploit
References () https://vuldb.com/?submit.575099 - () https://vuldb.com/?submit.575099 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.309323 - () https://vuldb.com/?ctiid.309323 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.309323 - () https://vuldb.com/?id.309323 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product

19 May 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 2.4
v2 : unknown
v3 : unknown
CWE CWE-94
CWE-79

18 May 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-18 04:15

Updated : 2025-06-04 20:10


NVD link : CVE-2025-4852

Mitre link : CVE-2025-4852


JSON object : View

Products Affected

totolink

  • a3002r
  • a3002r_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')