Skip to main content

CVE-2025-6162: Buffer Overflow in TOTOLINK EX1200T

High
VulnerabilityCVE-2025-6162cvecve-2025-6162
Published: Tue Jun 17 2025 (06/17/2025, 05:00:11 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: EX1200T

Description

A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/17/2025, 05:19:51 UTC

Technical Analysis

CVE-2025-6162 is a critical buffer overflow vulnerability identified in the TOTOLINK EX1200T wireless router, specifically in firmware version 4.1.2cu.5232_B20210713. The flaw resides in the HTTP POST request handler component, particularly in the /boafrm/formMultiAP endpoint. The vulnerability is triggered by manipulating the 'submit-url' argument in the POST request, which causes a buffer overflow condition. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise. The attack vector is remote and does not require user interaction or prior authentication, making it highly exploitable. The CVSS 4.0 score of 8.7 (high severity) reflects the ease of exploitation (network attack vector, low attack complexity), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation can allow an attacker to execute arbitrary code with elevated privileges, potentially taking full control of the device. Although no public exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the risk of exploitation. The lack of an official patch or mitigation from the vendor at the time of disclosure further exacerbates the threat. Given the role of the EX1200T as a consumer and small office/home office (SOHO) router, compromised devices could be leveraged as entry points into internal networks or as part of botnets for broader attacks.

Potential Impact

For European organizations, the exploitation of CVE-2025-6162 could have significant consequences. Many small and medium enterprises (SMEs), as well as home users, rely on TOTOLINK EX1200T routers for internet connectivity. A successful attack could lead to unauthorized network access, data interception, and lateral movement within corporate or home networks. This could result in data breaches, disruption of business operations, and compromise of sensitive information. Additionally, infected routers could be co-opted into botnets, contributing to distributed denial-of-service (DDoS) attacks or other malicious campaigns targeting European infrastructure. The vulnerability's remote exploitability and lack of authentication requirements make it a potent threat, especially in environments where network segmentation and monitoring are weak. Critical sectors such as finance, healthcare, and government agencies using these devices or connected networks could face elevated risks. Furthermore, the potential for widespread exploitation could undermine trust in network infrastructure and increase operational costs due to incident response and remediation efforts.

Mitigation Recommendations

1. Immediate network-level mitigation: Implement firewall rules to restrict inbound HTTP POST requests to the /boafrm/formMultiAP endpoint from untrusted sources. 2. Network segmentation: Isolate TOTOLINK EX1200T devices from critical internal networks to limit lateral movement in case of compromise. 3. Monitor network traffic for anomalous POST requests targeting the vulnerable endpoint, using IDS/IPS signatures tailored to detect exploit attempts against this vulnerability. 4. Disable remote management features on the router if enabled, especially those accessible from the internet, to reduce exposure. 5. Regularly audit and inventory network devices to identify the presence of TOTOLINK EX1200T routers running the affected firmware version. 6. Engage with TOTOLINK for firmware updates or patches; if unavailable, consider replacing vulnerable devices with models from vendors with active security support. 7. Educate users and administrators about the risks and signs of compromise related to this vulnerability. 8. Employ network anomaly detection tools to identify unusual outbound traffic patterns that may indicate exploitation or botnet activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-15T19:04:38.332Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6850f758a8c9212743852361

Added to database: 6/17/2025, 5:04:24 AM

Last enriched: 6/17/2025, 5:19:51 AM

Last updated: 8/6/2025, 3:50:47 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats