CVE-2025-5792: Buffer Overflow in TOTOLINK EX1200T
A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5792 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T router, specifically in firmware version 4.1.2cu.5232_B20210713. The vulnerability arises from improper handling of the HTTP POST request to the /boafrm/formWlanRedirect endpoint, where the 'redirect-url' parameter is processed insecurely. An attacker can remotely send a crafted HTTP POST request with a maliciously manipulated 'redirect-url' argument, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability affects the confidentiality, integrity, and availability of the device, with high impact on all three aspects (VC:H/VI:H/VA:H). Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vulnerability does not require user interaction and has a low attack complexity, making it a significant threat to affected devices. The TOTOLINK EX1200T is a consumer-grade wireless router, and exploitation could lead to full device compromise, enabling attackers to intercept network traffic, pivot into internal networks, or disrupt network services.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK EX1200T routers, this vulnerability poses a substantial risk. Compromise of these routers can lead to unauthorized access to internal networks, interception of sensitive data, and potential lateral movement to other critical systems. Given the router's role as a network gateway, attackers could manipulate network traffic, perform man-in-the-middle attacks, or deploy malware within the network. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic scanning by cybercriminals. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government agencies using these devices. Additionally, disruption of network availability could impact business continuity. The lack of authentication requirement means that attackers can exploit the vulnerability remotely without prior access, expanding the attack surface significantly.
Mitigation Recommendations
1. Immediate firmware update: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-5792 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Access control: Restrict remote management interfaces of the router to trusted IP addresses or disable remote HTTP management if not required. 4. Intrusion detection: Deploy network monitoring and intrusion detection systems to identify suspicious HTTP POST requests targeting /boafrm/formWlanRedirect or anomalous traffic patterns. 5. Replace outdated hardware: Consider replacing TOTOLINK EX1200T devices with models from vendors with strong security track records and active patch management. 6. User awareness: Educate users about the risks of using outdated firmware and encourage regular updates. 7. Firewall rules: Implement firewall rules to block unsolicited inbound HTTP POST requests to the router's management interface from untrusted networks. These measures, combined, reduce the risk of exploitation and limit potential damage.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5792: Buffer Overflow in TOTOLINK EX1200T
Description
A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5792 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T router, specifically in firmware version 4.1.2cu.5232_B20210713. The vulnerability arises from improper handling of the HTTP POST request to the /boafrm/formWlanRedirect endpoint, where the 'redirect-url' parameter is processed insecurely. An attacker can remotely send a crafted HTTP POST request with a maliciously manipulated 'redirect-url' argument, causing a buffer overflow condition. This overflow can potentially allow the attacker to execute arbitrary code on the device without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability affects the confidentiality, integrity, and availability of the device, with high impact on all three aspects (VC:H/VI:H/VA:H). Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vulnerability does not require user interaction and has a low attack complexity, making it a significant threat to affected devices. The TOTOLINK EX1200T is a consumer-grade wireless router, and exploitation could lead to full device compromise, enabling attackers to intercept network traffic, pivot into internal networks, or disrupt network services.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK EX1200T routers, this vulnerability poses a substantial risk. Compromise of these routers can lead to unauthorized access to internal networks, interception of sensitive data, and potential lateral movement to other critical systems. Given the router's role as a network gateway, attackers could manipulate network traffic, perform man-in-the-middle attacks, or deploy malware within the network. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic scanning by cybercriminals. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government agencies using these devices. Additionally, disruption of network availability could impact business continuity. The lack of authentication requirement means that attackers can exploit the vulnerability remotely without prior access, expanding the attack surface significantly.
Mitigation Recommendations
1. Immediate firmware update: Organizations and users should verify if TOTOLINK has released a patched firmware version addressing CVE-2025-5792 and apply it promptly. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Access control: Restrict remote management interfaces of the router to trusted IP addresses or disable remote HTTP management if not required. 4. Intrusion detection: Deploy network monitoring and intrusion detection systems to identify suspicious HTTP POST requests targeting /boafrm/formWlanRedirect or anomalous traffic patterns. 5. Replace outdated hardware: Consider replacing TOTOLINK EX1200T devices with models from vendors with strong security track records and active patch management. 6. User awareness: Educate users about the risks of using outdated firmware and encourage regular updates. 7. Firewall rules: Implement firewall rules to block unsolicited inbound HTTP POST requests to the router's management interface from untrusted networks. These measures, combined, reduce the risk of exploitation and limit potential damage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-06T08:24:39.648Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6843377571f4d251b5d8901b
Added to database: 6/6/2025, 6:46:13 PM
Last enriched: 7/8/2025, 11:26:16 AM
Last updated: 11/22/2025, 5:55:57 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.