← Back to CVEs
CVE-2025-5508
LOW2.4
Description
A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE Details
CVSS v3.1 Score2.4
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionREQUIRED
Published6/3/2025
Last Modified6/6/2025
Sourcenvd
Honeypot Sightings0
Affected Products
totolink:a3002ru-v2totolink:a3002ru_firmware
Weaknesses (CWE)
CWE-79CWE-94CWE-79
References
https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering(cna@vuldb.com)
https://vuldb.com/?ctiid.310922(cna@vuldb.com)
https://vuldb.com/?id.310922(cna@vuldb.com)
https://vuldb.com/?submit.584671(cna@vuldb.com)
https://www.totolink.net/(cna@vuldb.com)
https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_IP_Port_Filtering(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.