CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-5792: TOTOLINK EX1200T HTTP POST Request formWlanRedirect buffer overflow

8.8 CVSS

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /boafrm/formWlanRedirect der Komponente HTTP POST Request Handler. Mittels Manipulieren des Arguments redirect-url mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-5792

CVSS Base Severity: HIGH

CVSS Base Score: 8.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem Types

Buffer Overflow Memory Corruption

Affected Products

Vendor: TOTOLINK

Product: EX1200T

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.14% (probability of being exploited)

EPSS Percentile: 35.12% (scored less or equal to compared to others)

EPSS Date: 2025-06-27 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2025-5792
https://vuldb.com/?id.311339
https://vuldb.com/?ctiid.311339
https://vuldb.com/?submit.591220
https://github.com/byxs0x0/cve2/blob/main/1.md
https://www.totolink.net/

Timeline