CVE-2024-0291: CWE-77 Command Injection in Totolink LR1200GB
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249857 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0291 is a command injection vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The vulnerability resides in the UploadFirmwareFile function within the /cgi-bin/cstecgi.cgi endpoint. An attacker can manipulate the 'FileName' argument to inject arbitrary commands that the system executes. This flaw allows remote exploitation without user interaction, as the vulnerable CGI script processes the input directly. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that input is not properly sanitized before being passed to system commands. Although the CVSS v3.1 score is 6.3 (medium severity), the vulnerability's nature—remote command injection—poses a significant risk. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published yet. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation by threat actors. The vulnerability impacts confidentiality, integrity, and availability since arbitrary commands can be executed, potentially leading to data leakage, device takeover, or denial of service.
Potential Impact
For European organizations using the Totolink LR1200GB router, this vulnerability could lead to severe security breaches. Attackers could remotely execute commands to gain unauthorized access, manipulate network traffic, or disrupt network services. This is particularly concerning for small and medium enterprises or branch offices relying on this router model for internet connectivity and network management. Compromise could result in data exfiltration, lateral movement within corporate networks, or use of the device as a foothold for further attacks. Given the lack of vendor response and patches, organizations face prolonged exposure. The impact extends to critical infrastructure sectors if these routers are deployed in sensitive environments, potentially affecting operational continuity and data privacy under GDPR regulations.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately assess their network for the presence of Totolink LR1200GB devices running the affected firmware version. Mitigation steps include: 1) Isolate vulnerable devices from untrusted networks or restrict access to the /cgi-bin/cstecgi.cgi endpoint using firewall rules or network segmentation; 2) Disable remote management features or restrict management access to trusted IP addresses only; 3) Monitor network traffic for unusual command execution patterns or unexpected outbound connections from the router; 4) Consider replacing affected devices with models from vendors that provide timely security updates; 5) Implement strict input validation and web application firewall (WAF) rules if possible to detect and block command injection attempts; 6) Maintain an inventory and continuous vulnerability scanning to detect similar issues promptly; 7) Engage with Totolink support channels for updates and consider reporting the issue to national cybersecurity authorities to raise awareness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0291: CWE-77 Command Injection in Totolink LR1200GB
Description
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249857 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0291 is a command injection vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The vulnerability resides in the UploadFirmwareFile function within the /cgi-bin/cstecgi.cgi endpoint. An attacker can manipulate the 'FileName' argument to inject arbitrary commands that the system executes. This flaw allows remote exploitation without user interaction, as the vulnerable CGI script processes the input directly. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that input is not properly sanitized before being passed to system commands. Although the CVSS v3.1 score is 6.3 (medium severity), the vulnerability's nature—remote command injection—poses a significant risk. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published yet. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation by threat actors. The vulnerability impacts confidentiality, integrity, and availability since arbitrary commands can be executed, potentially leading to data leakage, device takeover, or denial of service.
Potential Impact
For European organizations using the Totolink LR1200GB router, this vulnerability could lead to severe security breaches. Attackers could remotely execute commands to gain unauthorized access, manipulate network traffic, or disrupt network services. This is particularly concerning for small and medium enterprises or branch offices relying on this router model for internet connectivity and network management. Compromise could result in data exfiltration, lateral movement within corporate networks, or use of the device as a foothold for further attacks. Given the lack of vendor response and patches, organizations face prolonged exposure. The impact extends to critical infrastructure sectors if these routers are deployed in sensitive environments, potentially affecting operational continuity and data privacy under GDPR regulations.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately assess their network for the presence of Totolink LR1200GB devices running the affected firmware version. Mitigation steps include: 1) Isolate vulnerable devices from untrusted networks or restrict access to the /cgi-bin/cstecgi.cgi endpoint using firewall rules or network segmentation; 2) Disable remote management features or restrict management access to trusted IP addresses only; 3) Monitor network traffic for unusual command execution patterns or unexpected outbound connections from the router; 4) Consider replacing affected devices with models from vendors that provide timely security updates; 5) Implement strict input validation and web application firewall (WAF) rules if possible to detect and block command injection attempts; 6) Maintain an inventory and continuous vulnerability scanning to detect similar issues promptly; 7) Engage with Totolink support channels for updates and consider reporting the issue to national cybersecurity authorities to raise awareness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-07T08:58:32.287Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdf7
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/4/2025, 4:57:56 PM
Last updated: 7/31/2025, 1:53:58 AM
Views: 10
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.