TOTOLINK EX1200T, Buffer Overflow Vulnerability, CVE-2025-5910 (Critical)

Listen to this Post

How the CVE Works:

CVE-2025-5910 is a critical buffer overflow vulnerability in TOTOLINK EX1200T routers (up to firmware version 4.1.2cu.5232_B20210713). The flaw resides in the `/boafrm/formWsc` endpoint, which mishandles HTTP POST requests due to insufficient bounds checking. Attackers can remotely exploit this by sending a crafted payload, overflowing the buffer and potentially executing arbitrary code. The vulnerability is publicly disclosed, increasing the risk of active exploitation.

DailyCVE Form:

Platform: TOTOLINK EX1200T
Version: ≤ 4.1.2cu.5232_B20210713
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/16/2025

Prediction: Patch expected by 07/15/2025

What Undercode Say:

curl -X POST -d "payload=<overflow_data>" http://<target>/boafrm/formWsc
exploit = b"A" 1024 + struct.pack("<I", 0xdeadbeef) Example overflow payload

How Exploit:

– Craft HTTP POST request with oversized payload.
– Trigger buffer overflow via /boafrm/formWsc.
– Overwrite return address for RCE.

Protection from this CVE:

– Update firmware post-patch release.
– Disable WSC if unused.
– Filter external POST requests.

Impact:

– Remote code execution.
– Full device compromise.
– Network infiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top