ID

VAR-202506-0408


CVE

CVE-2025-5793


TITLE

TOTOLINK  of  ex1200t  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-006878

DESCRIPTION

A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of ex1200t The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TOTOLINK EX1200T is a Wi-Fi range extender from China's TOTOLINK Electronics. The vulnerability is caused by the parameter service_type in the file /boafrm/formPortFw failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-5793 // JVNDB: JVNDB-2025-006878 // CNVD: CNVD-2025-12072

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12072

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1200tscope:eqversion:4.1.2cu.5232_b20210713

Trust: 1.0

vendor:totolinkmodel:ex1200tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1200tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1200tscope:eqversion:ex1200t firmware 4.1.2cu.5232 b20210713

Trust: 0.8

vendor:totolinkmodel:ex1200t 4.1.2cu.5232 b20210713scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-12072 // JVNDB: JVNDB-2025-006878 // NVD: CVE-2025-5793

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5793
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-5793
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-006878
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-12072
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5793
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-006878
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12072
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5793
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-5793
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-006878
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12072 // JVNDB: JVNDB-2025-006878 // NVD: CVE-2025-5793 // NVD: CVE-2025-5793

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006878 // NVD: CVE-2025-5793

EXTERNAL IDS

db:NVDid:CVE-2025-5793

Trust: 3.2

db:VULDBid:311340

Trust: 1.8

db:JVNDBid:JVNDB-2025-006878

Trust: 0.8

db:CNVDid:CNVD-2025-12072

Trust: 0.6

sources: CNVD: CNVD-2025-12072 // JVNDB: JVNDB-2025-006878 // NVD: CVE-2025-5793

REFERENCES

url:https://github.com/byxs0x0/cve2/blob/main/2.md

Trust: 2.4

url:https://vuldb.com/?id.311340

Trust: 1.8

url:https://vuldb.com/?submit.591222

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.311340

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5793

Trust: 0.8

sources: CNVD: CNVD-2025-12072 // JVNDB: JVNDB-2025-006878 // NVD: CVE-2025-5793

SOURCES

db:CNVDid:CNVD-2025-12072
db:JVNDBid:JVNDB-2025-006878
db:NVDid:CVE-2025-5793

LAST UPDATE DATE

2025-06-15T23:46:35.323000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12072date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006878date:2025-06-13T08:43:00
db:NVDid:CVE-2025-5793date:2025-06-12T16:20:02.057

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12072date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-006878date:2025-06-13T00:00:00
db:NVDid:CVE-2025-5793date:2025-06-06T18:15:36.227