CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK EX1200T wireless routers (up to version 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler for the /boafrm/formIpQoS endpoint. An authenticated remote attacker can exploit this vulnerability to achieve arbitrary code execution with complete system compromise (confidentiality, integrity, and availability). The exploit has been publicly disclosed and proof-of-concept code is available, making this a high-priority threat for affected deployments.
Technical Context
This vulnerability exists in the HTTP POST request handler component of TOTOLINK's web management interface, specifically in the /boafrm/formIpQoS endpoint. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition where user-supplied input via HTTP POST parameters is not properly validated before being copied into a fixed-size buffer. The vulnerable code processes Quality of Service (QoS) configuration parameters without adequate bounds checking. TOTOLINK EX1200T (CPE: cpe:2:3:totolink:ex1200t:*:*:*:*:*:*:*:*) is a dual-band AC1200 wireless router commonly deployed in small office and home office (SOHO) environments. The affected versions through 4.1.2cu.5232_B20210713 lack proper input sanitization in the firmware's embedded web server (likely BOA or similar lightweight HTTP daemon, indicated by the 'boafrm' path prefix).
Affected Products
EX1200T (up to 4.1.2cu.5232_B20210713)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17613