Severity
7.4HIGH
EPSS
1.4%
top 19.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 6
Latest updateJun 10

Description

A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/ex1200t4.1.2cu.5232_B20210713
NVDtotolink/ex1200t_firmware4.1.2cu.5232_b20210713

🔴Vulnerability Details

2
GHSA
GHSA-vv89-3cgg-g5p8: A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 42025-06-06
CVEList
TOTOLINK EX1200T HTTP POST Request formWlanRedirect buffer overflow2025-06-06

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink formWlanRedirect redirect-url Parameter Buffer Overflow Attempt (CVE-2025-5792)2025-06-10
CVE-2025-5792 (HIGH CVSS 7.4) | A vulnerability | cvebase.io