A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is the function setStaticDhcpConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Comment leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://kn0sinna.notion.site/TOTOLINK-EX1200T-stack-based-BufferOverflow-vulnerability-20fb1876cd6e80d5b4d1f7ec16de4ec2 | Exploit |
https://vuldb.com/?ctiid.313302 | Permissions Required VDB Entry |
https://vuldb.com/?id.313302 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.595473 | Third Party Advisory VDB Entry |
https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Jul 2025, 17:40
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-20 03:15
Updated : 2025-07-02 17:40
NVD link : CVE-2025-6302
Mitre link : CVE-2025-6302
CVE.ORG link : CVE-2025-6302
JSON object : View
Products Affected
totolink
- ex1200t_firmware
- ex1200t