-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2025-25579
PUBLISHED
More Info
Official Page
Assigner
-
mitre
Assigner Org ID
-
8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At
-
28 Mar, 2025 | 00:00
Updated At
-
31 Mar, 2025 | 17:47
Rejected At
-
▼
CVE Numbering Authority (CNA)
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injection in /bin/boa via bandstr.
Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
n/a
Problem Types
Type
CWE ID
Description
text
N/A
n/a
Type:
text
CWE ID:
N/A
Description:
n/a
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/regainer27/totolink_A3002R_remote_command_exec
N/A
https://gist.github.com/regainer27/0abf6f56eae3fa2826d2551e22c2ace3
N/A
Hyperlink:
https://github.com/regainer27/totolink_A3002R_remote_command_exec
Resource:
N/A
Hyperlink:
https://gist.github.com/regainer27/0abf6f56eae3fa2826d2551e22c2ace3
Resource:
N/A
▼
Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
Type
CWE ID
Description
CWE
CWE-78
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type:
CWE
CWE ID:
CWE-78
Description:
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
Version
Base score
Base severity
Vector
3.1
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version:
3.1
Base score:
9.8
Base severity:
CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/regainer27/totolink_A3002R_remote_command_exec
exploit
Hyperlink:
https://github.com/regainer27/totolink_A3002R_remote_command_exec
Resource:
exploit
Details not found