A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/byxs0x0/cve2/blob/main/5.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.311682 | Permissions Required VDB Entry |
https://vuldb.com/?id.311682 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.592270 | Third Party Advisory VDB Entry |
https://www.totolink.net/ | Product |
https://github.com/byxs0x0/cve2/blob/main/5.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
16 Jun 2025, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:totolink:ex1200t_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:* |
|
First Time |
Totolink
Totolink ex1200t Totolink ex1200t Firmware |
|
CWE | CWE-120 | |
References | () https://vuldb.com/?submit.592270 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.311682 - Permissions Required, VDB Entry | |
References | () https://github.com/byxs0x0/cve2/blob/main/5.md - Exploit, Third Party Advisory | |
References | () https://www.totolink.net/ - Product | |
References | () https://vuldb.com/?id.311682 - Third Party Advisory, VDB Entry |
10 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-119 |
10 Jun 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-10 02:15
Updated : 2025-06-16 17:14
NVD link : CVE-2025-5909
Mitre link : CVE-2025-5909
JSON object : View
Products Affected
totolink
- ex1200t
- ex1200t_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')