CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This issue affects some unknown processing of the file /boafrm/formSetLg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK X15 wireless router (firmware version 1.0.0-B20230714.1105) affecting the HTTP POST request handler for the /boafrm/formSetLg endpoint. An authenticated attacker can exploit the 'submit-url' parameter to trigger a buffer overflow, achieving remote code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code has been disclosed, making this an actively exploitable vulnerability with demonstrated proof-of-concept.
Technical Context
The vulnerability resides in the HTTP POST request handler component of the TOTOLINK X15 router's web management interface. The /boafrm/formSetLg endpoint processes the 'submit-url' parameter without proper input validation or bounds checking, leading to a classic stack-based or heap-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer). The affected technology involves embedded web server processing on a network device, where the router firmware handles user-supplied input during form submission. CPE identifier: cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:* indicates this is firmware-level code execution vulnerability in a consumer-grade Wi-Fi router, likely written in C/C++ without memory-safe boundaries.
Affected Products
TOTOLINK X15 (['1.0.0-B20230714.1105'])
Remediation
Upgrade to patched firmware version (not specified in available data; contact TOTOLINK support for latest stable release post-B20230714.1105); priority: IMMEDIATE; note: Firmware patches for consumer routers typically available through device web interface (Administration > Firmware Upgrade) or vendor website Workaround (Temporary - NOT a substitute for patching): Restrict HTTP/HTTPS access to the router's web management interface: (1) Disable remote management (Administration > System Settings > Enable Remote Management = OFF); (2) Restrict local access to trusted IP addresses via firewall rules if available; (3) Change default admin credentials to strong password; (4) Isolate router management to private network segment; priority: HIGH; note: These do not eliminate vulnerability but reduce attack surface Network Mitigation: Implement network-level controls: (1) Ensure router is behind upstream firewall; (2) Block external access to router management ports (HTTP/HTTPS typically 80/443 or 8080); (3) Monitor outbound connections from router for C2 communication; priority: MEDIUM Vendor Contact: Check TOTOLINK support portal and security advisories for patch release timeline; no vendor advisory URL provided in CVE data—direct contact recommended; priority: HIGH
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17095