CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is the function setStaticDhcpConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Comment leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6302 is a critical stack-based buffer overflow vulnerability in TOTOLINK EX1200T router firmware version 4.1.2cu.5232_B20210713, specifically in the setStaticDhcpConfig function of /cgi-bin/cstecgi.cgi. An authenticated attacker can exploit this by sending a malicious Comment parameter to achieve remote code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code has been disclosed, making this actively exploitable.
Technical Context
The vulnerability exists in the CGI binary interface (/cgi-bin/cstecgi.cgi) of TOTOLINK's embedded router firmware, which handles DHCP configuration via the setStaticDhcpConfig function. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically a stack-based buffer overflow where user-supplied input in the 'Comment' parameter is not properly validated before being written to a fixed-size stack buffer. This is typical of legacy embedded device firmware written in C without modern memory safety protections. The affected CPE would be cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*. The vulnerability affects the HTTP/HTTPS interface commonly found on residential and small-business routers.
Affected Products
EX1200T (['4.1.2cu.5232_B20210713'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18714