CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
A critical buffer overflow vulnerability exists in TOTOLINK X15 firmware version 1.0.0-B20230714.1105 affecting the HTTP POST request handler in the /boafrm/formPortFw endpoint. An authenticated attacker can exploit the unsanitized 'service_type' parameter to trigger a buffer overflow, achieving remote code execution with high impact on confidentiality, integrity, and availability. Public exploit code is available and the vulnerability meets criteria for active exploitation risk.
Technical Context
The vulnerability is rooted in CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition. The affected component is the HTTP POST request handler in TOTOLINK X15 wireless routers, specifically processing requests to /boafrm/formPortFw. The 'service_type' parameter lacks proper input validation and boundary checking, allowing an attacker to write beyond allocated buffer boundaries. The affected device is identified by CPE: cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*. This class of vulnerability typically affects embedded device firmware where memory constraints and simplified input handling create exploitation opportunities. The HTTP POST handler processes form data without adequate size validation before copying to stack or heap-allocated buffers.
Affected Products
X15 (['1.0.0-B20230714.1105'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17350