CVE-2025-4852

A vulnerability, which was classified as problematic, has been found in TOTOLINK A3002R 2.1.1-B20230720.1011. This issue affects some unknown processing of the component VPN Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

No configuration.

History

19 May 2025, 15:15

Type Values Removed Values Added
References () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_VPN - () https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_VPN -

19 May 2025, 13:35

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en TOTOLINK A3002R 2.1.1-B20230720.1011. Este problema afecta a un procesamiento desconocido del componente VPN Page. La manipulación del argumento "Comment" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

18 May 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-18 04:15

Updated : 2025-05-19 15:15


NVD link : CVE-2025-4852

Mitre link : CVE-2025-4852

CVE.ORG link : CVE-2025-4852


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')