CVE-2023-7219: CWE-121 Stack-based Buffer Overflow in Totolink N350RT
A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as critical. Affected by this vulnerability is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2023-7219 is a critical security vulnerability identified in the Totolink N350RT router, specifically in firmware version 9.3.5u.6139_B202012. The flaw is a stack-based buffer overflow (CWE-121) located in the loginAuth function within the /cgi-bin/cstecgi.cgi file. This vulnerability arises from improper handling of the http_host argument, which can be manipulated by an attacker to overflow the stack buffer. Exploiting this flaw can lead to arbitrary code execution, allowing an attacker to gain control over the device remotely without requiring user interaction. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with attack vector being network-based (remote), low attack complexity, but requiring high privileges (PR:H), and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation could allow an attacker to execute arbitrary code, potentially leading to full device compromise, data interception, or disruption of network services. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are currently available, leaving affected devices vulnerable. This vulnerability is particularly dangerous because routers like the Totolink N350RT serve as critical network infrastructure, and compromise could facilitate lateral movement within networks or serve as a foothold for further attacks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant. Totolink routers are commonly used in small to medium-sized enterprises and home office environments, which are prevalent across Europe. A compromised router could lead to interception of sensitive communications, unauthorized access to internal networks, and disruption of business operations. Given the high confidentiality, integrity, and availability impact, attackers could exfiltrate sensitive data, inject malicious traffic, or cause denial of service. The lack of vendor response and patch availability exacerbates the risk, as organizations may remain exposed for extended periods. Additionally, the remote exploitability without user interaction means that attackers can automate attacks at scale, potentially targeting multiple organizations simultaneously. This could be leveraged by cybercriminals or state-sponsored actors aiming to disrupt European business infrastructure or conduct espionage. The vulnerability also poses risks to critical infrastructure sectors that rely on stable and secure network connectivity, such as healthcare, finance, and manufacturing.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, isolate affected Totolink N350RT devices from critical network segments and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable remote management features if enabled. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting /cgi-bin/cstecgi.cgi endpoints. Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect buffer overflow attempts. Where possible, replace vulnerable devices with alternative routers from vendors with active security support. Regularly audit firmware versions and maintain an inventory of network devices to identify and prioritize vulnerable assets. Educate IT staff about this specific vulnerability to ensure rapid response if exploitation is detected. Finally, implement network segmentation to limit the impact of a compromised router on the broader organizational network.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-7219: CWE-121 Stack-based Buffer Overflow in Totolink N350RT
Description
A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as critical. Affected by this vulnerability is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2023-7219 is a critical security vulnerability identified in the Totolink N350RT router, specifically in firmware version 9.3.5u.6139_B202012. The flaw is a stack-based buffer overflow (CWE-121) located in the loginAuth function within the /cgi-bin/cstecgi.cgi file. This vulnerability arises from improper handling of the http_host argument, which can be manipulated by an attacker to overflow the stack buffer. Exploiting this flaw can lead to arbitrary code execution, allowing an attacker to gain control over the device remotely without requiring user interaction. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with attack vector being network-based (remote), low attack complexity, but requiring high privileges (PR:H), and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation could allow an attacker to execute arbitrary code, potentially leading to full device compromise, data interception, or disruption of network services. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are currently available, leaving affected devices vulnerable. This vulnerability is particularly dangerous because routers like the Totolink N350RT serve as critical network infrastructure, and compromise could facilitate lateral movement within networks or serve as a foothold for further attacks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant. Totolink routers are commonly used in small to medium-sized enterprises and home office environments, which are prevalent across Europe. A compromised router could lead to interception of sensitive communications, unauthorized access to internal networks, and disruption of business operations. Given the high confidentiality, integrity, and availability impact, attackers could exfiltrate sensitive data, inject malicious traffic, or cause denial of service. The lack of vendor response and patch availability exacerbates the risk, as organizations may remain exposed for extended periods. Additionally, the remote exploitability without user interaction means that attackers can automate attacks at scale, potentially targeting multiple organizations simultaneously. This could be leveraged by cybercriminals or state-sponsored actors aiming to disrupt European business infrastructure or conduct espionage. The vulnerability also poses risks to critical infrastructure sectors that rely on stable and secure network connectivity, such as healthcare, finance, and manufacturing.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, isolate affected Totolink N350RT devices from critical network segments and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable remote management features if enabled. Monitor network traffic for unusual patterns or signs of exploitation attempts targeting /cgi-bin/cstecgi.cgi endpoints. Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect buffer overflow attempts. Where possible, replace vulnerable devices with alternative routers from vendors with active security support. Regularly audit firmware versions and maintain an inventory of network devices to identify and prioritize vulnerable assets. Educate IT staff about this specific vulnerability to ensure rapid response if exploitation is detected. Finally, implement network segmentation to limit the impact of a compromised router on the broader organizational network.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-07T08:37:42.953Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6f10
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 7:12:15 AM
Last updated: 8/4/2025, 10:26:07 AM
Views: 11
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.