Skip to main content

CVE-2024-0293: CWE-78 OS Command Injection in Totolink LR1200GB

Medium
VulnerabilityCVE-2024-0293cvecve-2024-0293cwe-78
Published: Mon Jan 08 2024 (01/08/2024, 02:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: LR1200GB

Description

A vulnerability classified as critical was found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this vulnerability is the function setUploadSetting of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249859. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:57:05 UTC

Technical Analysis

CVE-2024-0293 is a critical security vulnerability identified in the Totolink LR1200GB router, specifically version 9.1.0u.6619_B20230130. The flaw exists in the setUploadSetting function within the /cgi-bin/cstecgi.cgi file. This vulnerability is an OS command injection (CWE-78), which occurs when the FileName argument is manipulated by an attacker to inject arbitrary operating system commands. The vulnerability can be exploited remotely without user interaction, although it requires low-level privileges (PR:L) on the device. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector network (AV:N), low attack complexity (AC:L), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, but with limited confidentiality and integrity impact and a more notable availability impact. The vendor has been contacted but has not responded or issued a patch, and no known exploits are currently observed in the wild. The vulnerability allows attackers to execute arbitrary commands on the router’s underlying operating system, potentially leading to full device compromise, unauthorized access to network traffic, or disruption of network services. Given the router’s role as a network gateway, exploitation could enable lateral movement within a network or facilitate further attacks against connected systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the Totolink LR1200GB. Successful exploitation could lead to unauthorized control over the network gateway, enabling attackers to intercept, modify, or disrupt network traffic. This could result in data breaches, loss of sensitive information, or denial of service affecting business continuity. The lack of vendor response and absence of patches increases the risk exposure period. Additionally, compromised routers could be used as pivot points for broader attacks within corporate networks or as part of botnets for distributed denial-of-service (DDoS) attacks. The medium CVSS score reflects the need for attention but also indicates that exploitation requires some level of privilege, which might limit immediate mass exploitation but does not eliminate risk for targeted attacks.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately isolate affected Totolink LR1200GB devices from critical network segments and restrict remote management access, especially from untrusted networks. 2) Disable or restrict access to the /cgi-bin/cstecgi.cgi interface if possible, or implement strict firewall rules to limit access to trusted IP addresses only. 3) Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from the router. 4) Where feasible, replace affected devices with alternative routers from vendors with active security support and patch management. 5) Employ network segmentation to limit the impact of a compromised router on sensitive systems. 6) Use intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting this vulnerability. 7) Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation. 8) Engage with Totolink or authorized distributors to seek firmware updates or security advisories. 9) Educate IT staff on the risks of OS command injection vulnerabilities and the importance of timely patching and device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-07T08:58:38.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff416

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 12:57:05 AM

Last updated: 8/14/2025, 10:24:29 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats