CVE-2025-5910

8.8 HIGH

📋 TL;DR

This critical vulnerability in TOTOLINK EX1200T routers allows remote attackers to execute arbitrary code via a buffer overflow in the HTTP POST request handler. Attackers can exploit this without authentication to potentially take full control of affected devices. All users of TOTOLINK EX1200T routers up to version 4.1.2cu.5232_B20210713 are affected.

💻 Affected Systems

Products:
  • TOTOLINK EX1200T
Versions: Up to and including 4.1.2cu.5232_B20210713
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the affected component is part of the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistent backdoor installation, network pivoting, and data exfiltration.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept network traffic, or launch attacks against internal systems.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering, though internal network compromise remains possible.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely without authentication, making internet-facing devices immediate targets.
🏢 Internal Only: HIGH - Even internally, attackers could exploit this from compromised internal systems to pivot through the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, and the vulnerability requires no authentication, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates. 2. Download latest firmware for EX1200T. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the vulnerable web interface

Access router web interface > System > Remote Management > Disable

Restrict web interface access

all

Limit access to router management interface to trusted IPs only

Access router web interface > Firewall > Access Control > Add trusted IP ranges

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments with strict firewall rules
  • Implement network monitoring for exploit attempts and unusual traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: System > Firmware Upgrade > Current Version

Check Version:

curl -s http://router-ip/boafrm/formWsc | grep version

Verify Fix Applied:

Verify firmware version is newer than 4.1.2cu.5232_B20210713

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /boafrm/formWsc
  • Multiple failed buffer overflow attempts
  • Unexpected router configuration changes

Network Indicators:

  • HTTP POST requests with oversized payloads to router management interface
  • Unusual outbound traffic from router

SIEM Query:

source="router_logs" AND (uri="/boafrm/formWsc" OR message="buffer overflow")

🔗 References

📤 Share & Export