CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in TOTOLINK EX1200T wireless router (firmware version 4.1.2cu.5232_B20210713) affecting the HTTP POST request handler at endpoint /boafrm/formSysCmd. An authenticated remote attacker can exploit this vulnerability by manipulating the 'submit-url' parameter to achieve buffer overflow, resulting in complete system compromise including confidentiality, integrity, and availability breaches. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.
Technical Context
This vulnerability exists in the HTTP POST request handler component of the TOTOLINK EX1200T router's web management interface. The affected endpoint /boafrm/formSysCmd processes user-supplied input via the 'submit-url' parameter without proper bounds checking, triggering CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The router firmware 4.1.2cu.5232_B20210713 contains insufficient input validation in the form submission handler, allowing attackers to write beyond allocated buffer boundaries. This is a classic buffer overflow vulnerability in embedded device firmware where legacy C-based code often lacks modern memory safety protections. The vulnerability affects CPE: cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*
Affected Products
EX1200T (['4.1.2cu.5232_B20210713'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18424