Skip to main content

CVE-2025-5792: Buffer Overflow in TOTOLINK EX1200T

High
VulnerabilityCVE-2025-5792cvecve-2025-5792
Published: Fri Jun 06 2025 (06/06/2025, 18:00:15 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: EX1200T

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 11:26:16 UTC

Technical Analysis

CVE-2025-5792 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T router, specifically in firmware version 4.1.2cu.5232_B20210713. The vulnerability arises from improper handling of the HTTP POST request to the /boafrm/formWlanRedirect endpoint, where the 'redirect-url' parameter is processed insecurely. An attacker can remotely send a crafted HTTP POST request with a maliciously manipulated 'redirect-url' argument, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability affects the confidentiality, integrity, and availability of the device, with high impact on all three aspects (VC:H/VI:H/VA:H). Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vulnerability does not require user interaction and has a low attack complexity, making it a significant threat to affected devices. The TOTOLINK EX1200T is a consumer-grade wireless router, and exploitation could lead to full device compromise, enabling attackers to intercept network traffic, pivot into internal networks, or disrupt network services.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK EX1200T routers, this vulnerability poses a substantial risk. Compromise of these routers can lead to unauthorized access to internal networks, interception of sensitive data, and potential lateral movement to other critical systems. Given the router's role as a network gateway, attackers could manipulate network traffic, perform man-in-the-middle attacks, or deploy malware within the network. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic scanning by cybercriminals. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government agencies using these devices. Additionally, disruption of network availability could impact business continuity. The lack of authentication requirement means that attackers can exploit the vulnerability remotely without prior access, expanding the attack surface significantly.

Mitigation Recommendations

1. Immediate firmware update: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-5792 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Access control: Restrict remote management interfaces of the router to trusted IP addresses or disable remote HTTP management if not required. 4. Intrusion detection: Deploy network monitoring and intrusion detection systems to identify suspicious HTTP POST requests targeting /boafrm/formWlanRedirect or anomalous traffic patterns. 5. Replace outdated hardware: Consider replacing TOTOLINK EX1200T devices with models from vendors with strong security track records and active patch management. 6. User awareness: Educate users about the risks of using outdated firmware and encourage regular updates. 7. Firewall rules: Implement firewall rules to block unsolicited inbound HTTP POST requests to the router's management interface from untrusted networks. These measures, combined, reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-06T08:24:39.648Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6843377571f4d251b5d8901b

Added to database: 6/6/2025, 6:46:13 PM

Last enriched: 7/8/2025, 11:26:16 AM

Last updated: 8/1/2025, 7:25:48 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats