Submit #717720: TOTOLINK T10 V2_Firmware V4.1.8cu.5083_B20200521 Buffer Overflowinfo

TitleTOTOLINK T10 V2_Firmware V4.1.8cu.5083_B20200521 Buffer Overflow
DescriptionA stack-based buffer overflow vulnerability exists in the HTTP login request handling logic of the TOTOLINK T10 router. The issue is located in the cstecgi.cgi component, where attacker-controlled input from an HTTP request is written into a fixed-size stack buffer using the sprintf function without proper bounds checking. The vulnerable code path is reachable during normal web management operations when processing a login request (action=login) and does not require authentication. Excessive input may lead to memory corruption and denial of service. Reproduction in emulated environments is limited due to hardware-specific initialization logic (apmib_init), which requires access to valid MTD flash devices present on real hardware.
Source⚠️ https://github.com/JackWesleyy/CVE/blob/main/TOTOLINK_T10_BOC.md
User
 JackWesley (UID 93590)
Submission12/17/2025 14:39 (4 months ago)
Moderation12/19/2025 11:33 (2 days later)
StatusAccepted
VulDB entry337599 [TOTOLINK T10 4.1.8cu.5083_B20200521 /cgi-bin/cstecgi.cgi sprintf loginAuthUrl stack-based overflow]
Points20

Interested in the pricing of exploits?

See the underground prices here!