EUVD-2025-18419

| CVE-2025-6129 HIGH
2025-06-16 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 21:59 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:59 euvd
EUVD-2025-18419
PoC Detected
Jul 02, 2025 - 17:40 vuln.today
Public exploit code
CVE Published
Jun 16, 2025 - 16:15 nvd
HIGH 8.8

Description

A vulnerability classified as critical was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formSaveConfig of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in TOTOLINK EX1200T firmware version 4.1.2cu.5232_B20210713 affecting the HTTP POST request handler in the /boafrm/formSaveConfig endpoint. An authenticated remote attacker can exploit improper input validation on the 'submit-url' parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code exists, increasing real-world exploitation risk.

Technical Context

The vulnerability exists in the HTTP POST request handling component (specifically the formSaveConfig function) of TOTOLINK's firmware, which processes user-supplied input from the 'submit-url' parameter without adequate bounds checking. This is a classic CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) stack or heap-based buffer overflow. The affected device is a wireless router/mesh networking device (EX1200T model), and the vulnerability stems from unsafe string operations (likely strcpy, sprintf, or similar C library functions) that do not validate input length before copying to fixed-size buffers. The HTTP POST handler runs with elevated privileges as part of the router's web management interface, allowing authenticated users to write beyond allocated memory boundaries and potentially overwrite function pointers, return addresses, or other critical data structures to achieve code execution.

Affected Products

TOTOLIK EX1200T, firmware version 4.1.2cu.5232_B20210713. Likely affected CPE: cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*. The EX1200T is a dual-band mesh/range extender Wi-Fi device commonly deployed in small office and home office (SOHO) environments. Other TOTOLINK models with similar firmware architecture may be affected; firmware versions before and up to the patched version should be considered vulnerable. No vendor advisories or patch status provided in the source data; recommend checking TOTOLINK's official security bulletin or support portal for affected firmware versions and available updates.

Remediation

Immediate actions: (1) Identify and inventory all TOTOLIK EX1200T devices in your environment, specifically those running firmware 4.1.2cu.5232_B20210713 or potentially earlier versions with identical vulnerable code; (2) Check TOTOLINK's official website (typically support.totolink.com or equivalent) for security patches and firmware updates; (3) If patches are available, apply them urgently via the device's web interface or firmware update mechanism, ensuring stable power and network connectivity during updates; (4) Interim mitigations if patches unavailable: (a) restrict HTTP/HTTPS access to the device's management interface to trusted IP addresses only using firewall rules or device ACLs, (b) disable remote management features if available, (c) change default/weak administrative credentials to strong, unique passwords, (d) isolate vulnerable devices on restricted VLANs with minimal trust; (5) monitor device logs for suspicious POST requests to /boafrm/formSaveConfig with unusual submit-url parameter values. Long-term: evaluate replacement with devices from vendors with more reliable security patching practices.

Priority Score

65
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +44
POC: +20

Share

EUVD-2025-18419 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy