CVE-2025-5736

8.8 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in TOTOLINK X15 routers allows remote attackers to execute arbitrary code by sending specially crafted HTTP POST requests to the /boafrm/formNtp endpoint. This affects TOTOLINK X15 routers running firmware version 1.0.0-B20230714.1105. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • TOTOLINK X15
Versions: 1.0.0-B20230714.1105
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web management interface and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, creation of persistent backdoors, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept network traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Denial of service or limited information disclosure if exploit attempts are detected and blocked by network security controls.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests, making internet-facing devices immediately vulnerable to attack.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, and the vulnerability requires no authentication, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates. 2. Download latest firmware for X15 model. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the vulnerable web interface by disabling remote management features.

Access router web interface > System > Remote Management > Disable

Network Segmentation

all

Isolate affected routers in separate VLANs with strict firewall rules to limit attack surface.

🧯 If You Can't Patch

  • Implement strict network access controls to block all external access to router management interfaces
  • Deploy intrusion prevention systems (IPS) with signatures to detect and block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: System > Firmware Upgrade > Current Version. If version is 1.0.0-B20230714.1105, device is vulnerable.

Check Version:

curl -s http://router-ip/boafrm/formSysCmd | grep -i version

Verify Fix Applied:

After firmware update, verify version has changed from 1.0.0-B20230714.1105 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /boafrm/formNtp with unusually long submit-url parameters
  • Router crash/restart logs following HTTP requests

Network Indicators:

  • HTTP traffic to router IP on port 80/443 with POST requests containing buffer overflow patterns in submit-url parameter

SIEM Query:

source="router_logs" AND (url="/boafrm/formNtp" AND method="POST" AND param_length>1000)

🔗 References

📤 Share & Export