CVE-2025-6145: Buffer Overflow in TOTOLINK EX1200T
A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6145 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T router, specifically version 4.1.2cu.5232_B20210713. The flaw resides in the HTTP POST request handler component, within the /boafrm/formSysLog endpoint. An attacker can exploit this vulnerability by manipulating the 'submit-url' argument in the POST request, causing a buffer overflow. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to severe consequences including remote code execution, denial of service, or system compromise. The CVSS 4.0 base score is 8.7 (high severity), reflecting the high impact on confidentiality, integrity, and availability (all rated high), and the low attack complexity. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The vulnerability affects a specific firmware version of the TOTOLINK EX1200T, a consumer-grade wireless router commonly used in home and small office environments. The lack of available patches at the time of disclosure further elevates the risk for affected users.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK EX1200T routers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to gain unauthorized remote access to the network, potentially leading to data breaches, interception of sensitive communications, or pivoting to internal systems. The compromise of network infrastructure devices like routers can undermine network integrity and availability, disrupting business operations. Given the router’s role as a gateway device, attackers could manipulate traffic, deploy man-in-the-middle attacks, or create persistent backdoors. The impact is particularly critical for organizations with limited IT security resources that may not promptly detect or mitigate such attacks. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, affecting broader network stability in European regions.
Mitigation Recommendations
1. Immediate identification and inventory of all TOTOLINK EX1200T devices running the affected firmware version (4.1.2cu.5232_B20210713) within the organization’s network. 2. Apply firmware updates as soon as TOTOLINK releases a patch addressing CVE-2025-6145. Until then, consider temporary mitigations such as disabling remote management interfaces or restricting access to the router’s web interface to trusted IP addresses only. 3. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. 4. Monitor network traffic for unusual POST requests targeting /boafrm/formSysLog or anomalous behavior indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 6. Educate users and administrators about the risks associated with outdated router firmware and encourage regular updates. 7. For organizations unable to immediately patch, consider replacing vulnerable devices with models from vendors with stronger security track records and timely patch management. 8. Collaborate with ISPs and security communities to share threat intelligence regarding exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-6145: Buffer Overflow in TOTOLINK EX1200T
Description
A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6145 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T router, specifically version 4.1.2cu.5232_B20210713. The flaw resides in the HTTP POST request handler component, within the /boafrm/formSysLog endpoint. An attacker can exploit this vulnerability by manipulating the 'submit-url' argument in the POST request, causing a buffer overflow. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to severe consequences including remote code execution, denial of service, or system compromise. The CVSS 4.0 base score is 8.7 (high severity), reflecting the high impact on confidentiality, integrity, and availability (all rated high), and the low attack complexity. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The vulnerability affects a specific firmware version of the TOTOLINK EX1200T, a consumer-grade wireless router commonly used in home and small office environments. The lack of available patches at the time of disclosure further elevates the risk for affected users.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK EX1200T routers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to gain unauthorized remote access to the network, potentially leading to data breaches, interception of sensitive communications, or pivoting to internal systems. The compromise of network infrastructure devices like routers can undermine network integrity and availability, disrupting business operations. Given the router’s role as a gateway device, attackers could manipulate traffic, deploy man-in-the-middle attacks, or create persistent backdoors. The impact is particularly critical for organizations with limited IT security resources that may not promptly detect or mitigate such attacks. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, affecting broader network stability in European regions.
Mitigation Recommendations
1. Immediate identification and inventory of all TOTOLINK EX1200T devices running the affected firmware version (4.1.2cu.5232_B20210713) within the organization’s network. 2. Apply firmware updates as soon as TOTOLINK releases a patch addressing CVE-2025-6145. Until then, consider temporary mitigations such as disabling remote management interfaces or restricting access to the router’s web interface to trusted IP addresses only. 3. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. 4. Monitor network traffic for unusual POST requests targeting /boafrm/formSysLog or anomalous behavior indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 6. Educate users and administrators about the risks associated with outdated router firmware and encourage regular updates. 7. For organizations unable to immediately patch, consider replacing vulnerable devices with models from vendors with stronger security track records and timely patch management. 8. Collaborate with ISPs and security communities to share threat intelligence regarding exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-15T18:29:58.882Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6850a2f8a8c921274384c03f
Added to database: 6/16/2025, 11:04:24 PM
Last enriched: 6/16/2025, 11:19:36 PM
Last updated: 7/31/2025, 4:57:05 PM
Views: 12
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.