CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as critical. Affected is an unknown function of the file /boafrm/formDMZ of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK X15 1.0.0-B20230714.1105 affecting the DMZ configuration HTTP POST handler. An authenticated attacker can exploit a malformed 'submit-url' parameter in the /boafrm/formDMZ endpoint to achieve remote code execution with full system compromise (confidentiality, integrity, and availability impact). A proof-of-concept exploit has been publicly disclosed, and the vulnerability may be actively exploited in the wild.
Technical Context
The vulnerability exists in the HTTP POST request handler component of TOTOLIK X15 router firmware, specifically within the /boafrm/formDMZ endpoint that processes DMZ (Demilitarized Zone) configuration requests. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow flaw where user-supplied input in the 'submit-url' parameter is not properly validated or length-checked before being copied into a fixed-size buffer. TOTOLINK X15 is a residential/SOHO WiFi router (CPE likely: cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*). The HTTP POST handler fails to implement bounds checking, allowing an attacker to overflow the buffer and overwrite adjacent memory regions, including the stack or heap, leading to arbitrary code execution.
Affected Products
X15 (['1.0.0-B20230714.1105'])
Remediation
Monitor TOTOLINK official channels for security updates; apply immediately upon release Network Mitigation: Implement network-level access controls; disable remote management if not required; use strong, unique admin credentials Workaround: Assess business need for DMZ; if optional, disable via firmware settings or network segmentation Detection: Enable verbose logging; alert on POST requests with payloads >256 bytes to this endpoint
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17323