CVE-2025-5910

| EUVD-2025-17616 HIGH
2025-06-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17616
PoC Detected
Jun 16, 2025 - 17:13 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 03:15 nvd
HIGH 8.8

Description

A vulnerability has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in TOTOLINK EX1200T routers (firmware versions up to 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler at endpoint /boafrm/formWsc. An authenticated remote attacker can exploit this vulnerability to achieve arbitrary code execution with complete system compromise (confidentiality, integrity, and availability). The vulnerability has public exploit code available and may be actively exploited in the wild.

Technical Context

This vulnerability exists in the HTTP POST request handler component of TOTOLINK EX1200T WiFi routers, specifically in the /boafrm/formWsc endpoint. The vulnerability is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition where insufficient input validation and bounds checking allow attackers to write data beyond allocated buffer boundaries. The affected component is part of the router's web-based management interface (likely the 'boa' HTTP server used in embedded networking devices). The vulnerable firmware versions range from base 4.1.2cu up to 5232_B20210713, suggesting this is a consumer-grade 802.11ac WiFi router with a web management portal written in C/C++ without proper memory safety mechanisms.

Affected Products

TOTOLINK EX1200T: Firmware versions 4.1.2cu.5232_B20210713 and earlier. CPE would be: cpe:2.3:o:totolink:ex1200t_firmware:*:*:*:*:*:*:*:* (versions <=4.1.2cu.5232_B20210713). Device CPE: cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:*. The affected product is a consumer WiFi router typically sold through electronics retailers and used in SMB/enterprise environments for branch connectivity. Vendor has not released public advisory information in accessible sources as of this analysis.

Remediation

IMMEDIATE ACTIONS: (1) Upgrade firmware to version after 4.1.2cu.5232_B20210713 if available from TOTOLINK. Check TOTOLINK support portal (totolink.net) for latest EX1200T firmware releases. (2) If no patched firmware is available, implement network segmentation: restrict HTTP/HTTPS access to router management interface to trusted internal networks only via firewall rules, disallow remote management (disable UPnP, remote admin features). (3) Change default admin credentials to strong passwords immediately. (4) Disable unnecessary services (UPnP, remote management) if not required. (5) Monitor router logs for POST requests to /boafrm/formWsc endpoint. MEDIUM-TERM: (1) Evaluate router replacement with firmware-updatable alternatives from vendors with active security patches. (2) Implement WAF rules if router is accessible from untrusted networks. (3) Apply principle of least privilege to router access. Note: TOTOLINK is known for inconsistent security patching; verify patch availability before rollout as some firmware versions may not be released publicly.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

CVE-2025-5910 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy