Skip to main content

CVE-2025-5790: Buffer Overflow in TOTOLINK X15

High
VulnerabilityCVE-2025-5790cvecve-2025-5790
Published: Fri Jun 06 2025 (06/06/2025, 17:31:11 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: X15

Description

A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. This vulnerability affects unknown code of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:42:00 UTC

Technical Analysis

CVE-2025-5790 is a critical buffer overflow vulnerability identified in the TOTOLINK X15 router firmware version 1.0.0-B20230714.1105. The vulnerability exists in the HTTP POST request handler component, specifically in the /boafrm/formIpQoS endpoint. An attacker can remotely exploit this flaw by manipulating the 'mac' argument in the POST request, causing a buffer overflow. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise without requiring user interaction or prior authentication. The CVSS 4.0 score of 8.7 reflects a high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts the confidentiality, integrity, and availability of the device, as successful exploitation could allow an attacker to execute arbitrary code with elevated privileges, potentially taking full control of the router. While no public exploits are currently known in the wild, the disclosure of the exploit details increases the risk of active exploitation. The lack of available patches at the time of publication further elevates the threat level for affected users.

Potential Impact

For European organizations, the TOTOLINK X15 router is often deployed in small to medium business environments and residential settings due to its cost-effectiveness and feature set. Exploitation of this vulnerability could lead to network compromise, interception of sensitive communications, and disruption of internet connectivity. Attackers could leverage compromised routers as footholds for lateral movement into corporate networks or as part of botnets for broader attacks. The impact is particularly severe for organizations relying on these devices for perimeter security or VPN termination. Confidentiality breaches could expose sensitive business data, while integrity and availability impacts could disrupt business operations. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices en masse, increasing the risk of widespread impact across European enterprises and home users alike.

Mitigation Recommendations

Organizations should immediately identify any TOTOLINK X15 devices running the vulnerable firmware version 1.0.0-B20230714.1105. Since no official patches are currently available, temporary mitigations include disabling remote management interfaces and restricting HTTP POST access to the /boafrm/formIpQoS endpoint via firewall rules or access control lists. Network segmentation should be enforced to isolate vulnerable devices from critical infrastructure. Monitoring network traffic for unusual POST requests targeting the affected endpoint can help detect exploitation attempts. Additionally, organizations should engage with TOTOLINK support channels to obtain firmware updates or advisories and plan for prompt firmware upgrades once patches are released. Employing intrusion detection/prevention systems with updated signatures for this vulnerability can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-06T07:17:50.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68443c7f71f4d251b50d005a

Added to database: 6/7/2025, 1:19:59 PM

Last enriched: 7/8/2025, 12:42:00 PM

Last updated: 8/18/2025, 4:32:41 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats