CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK EX1200T wireless routers (up to firmware version 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler for the /boafrm/formReflashClientTbl endpoint. An authenticated attacker can remotely exploit this vulnerability to achieve complete system compromise including confidentiality, integrity, and availability violations. Public exploit code has been disclosed, making this an active threat with demonstrated proof-of-concept availability.
Technical Context
The vulnerability exists in the HTTP POST request handler component of TOTOLINK's web management interface, specifically within the formReflashClientTbl form processing function. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating a classic stack or heap buffer overflow condition. The vulnerability occurs when user-supplied input from HTTP POST requests is processed without proper bounds checking before being written to a fixed-size buffer. TOTOLINK EX1200T (CPE: cpe:2.3:o:totolink:ex1200t_firmware:*:*:*:*:*:*:*:* up to version 4.1.2cu.5232_B20210713) devices using this vulnerable firmware version are affected. The affected component suggests the vulnerability is in the device's web administration interface, likely used for firmware updates or client management operations.
Affected Products
EX1200T (firmware up to 4.1.2cu.5232_B20210713)
Remediation
- action: Firmware Update; details: Update TOTOLINK EX1200T firmware to version newer than 4.1.2cu.5232_B20210713. Contact TOTOLINK support or check device management interface for available firmware updates. Verify update authenticity through official TOTOLINK channels.; priority: CRITICAL - Apply immediately - action: Access Control Mitigation; details: If firmware update is unavailable, implement network-level mitigations: (1) Restrict access to the device's web management interface (port 80/443) using firewall rules to trusted administrative networks only, (2) Disable remote management if enabled, (3) Change default credentials to strong, unique passwords to reduce authentication bypass risk.; priority: HIGH - Implement pending patch availability - action: Monitoring; details: Monitor device logs for POST requests to /boafrm/formReflashClientTbl with unusually large payloads or malformed input. Configure IDS/IPS signatures to detect buffer overflow attack patterns against this endpoint.; priority: MEDIUM - Implement for detection coverage - action: Device Assessment; details: Audit network inventory for TOTOLINK EX1200T devices and determine firmware versions in use. Prioritize patching for devices exposed to untrusted networks or with multiple user accounts.; priority: MEDIUM - Scope the exposure
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17617