| Title | TOTOLINK T10 V2_Firmware V4.1.8cu.5083_B20200521 Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in the HTTP login request handling logic of the TOTOLINK T10 router.
The issue is located in the cstecgi.cgi component, where attacker-controlled input from an HTTP request is written into a fixed-size stack buffer using the sprintf function without proper bounds checking.
The vulnerable code path is reachable during normal web management operations when processing a login request (action=login) and does not require authentication. Excessive input may lead to memory corruption and denial of service.
Reproduction in emulated environments is limited due to hardware-specific initialization logic (apmib_init), which requires access to valid MTD flash devices present on real hardware. |
|---|
| Source | ⚠️ https://github.com/JackWesleyy/CVE/blob/main/TOTOLINK_T10_BOC.md |
|---|
| User | JackWesley (UID 93590) |
|---|
| Submission | 12/17/2025 14:39 (4 months ago) |
|---|
| Moderation | 12/19/2025 11:33 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 337599 [TOTOLINK T10 4.1.8cu.5083_B20200521 /cgi-bin/cstecgi.cgi sprintf loginAuthUrl stack-based overflow] |
|---|
| Points | 20 |
|---|