CVE-2025-5792

A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/byxs0x0/cve2/blob/main/1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.311339 Permissions Required
https://vuldb.com/?id.311339 Third Party Advisory VDB Entry
https://vuldb.com/?submit.591220 Third Party Advisory VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:*

History

12 Jun 2025, 16:20

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-06 18:15

Updated : 2025-06-12 16:20


NVD link : CVE-2025-5792

Mitre link : CVE-2025-5792

CVE.ORG link : CVE-2025-5792


JSON object : View

Products Affected

totolink

  • ex1200t_firmware
  • ex1200t
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')