CVE-2025-5508

A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru-v2:-:*:*:*:*:*:*:*

History

06 Jun 2025, 15:14

Type Values Removed Values Added
CPE cpe:2.3:h:totolink:a3002ru-v2:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
References () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering - () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.310922 - () https://vuldb.com/?ctiid.310922 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.310922 - () https://vuldb.com/?id.310922 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.584671 - () https://vuldb.com/?submit.584671 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
First Time Totolink a3002ru-v2
Totolink a3002ru Firmware
Totolink

04 Jun 2025, 14:54

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en TOTOLINK A3002RU 2.1.1-B20230720.1011. Se ha clasificado como problemática. Este problema afecta a una funcionalidad desconocida del componente IP Port Filtering Page. La manipulación del argumento "Comment" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

03 Jun 2025, 18:15

Type Values Removed Values Added
References () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering - () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering -

03 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 16:15

Updated : 2025-06-06 15:14


NVD link : CVE-2025-5508

Mitre link : CVE-2025-5508

CVE.ORG link : CVE-2025-5508


JSON object : View

Products Affected

totolink

  • a3002ru-v2
  • a3002ru_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')