Impact
A stack‑based buffer overflow occurs in the static_ipv6 parameter of the formIpv6Setup function in TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 firmware. This allows an attacker to corrupt the stack and potentially execute arbitrary code, resulting in full compromise of the device. The weakness is classed as CWE‑121 and CWE‑787, indicating unchecked input handling leading to buffer overflows.
Affected Systems
The vulnerability affects TOTOLINK A3002RU_V3 routers running firmware version 3.0.0-B20220304.1804. The affected component is the router’s web interface handling IPv6 configuration via the formIpv6Setup API.
Risk and Exploitability
The CVSS score of 8.8 signifies high severity, and the EPSS score of less than 1% indicates exploitation likelihood is very low but not impossible. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote access through the router’s network interface; if the vulnerable API is exposed to the LAN or WAN, an attacker can send a crafted request to trigger the overflow.
OpenCVE Enrichment