Skip to main content

CVE-2024-0297: CWE-78 OS Command Injection in Totolink N200RE

High
VulnerabilityCVE-2024-0297cvecve-2024-0297cwe-78
Published: Mon Jan 08 2024 (01/08/2024, 04:31:03 UTC)
Source: CVE
Vendor/Project: Totolink
Product: N200RE

Description

A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249863. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:40:03 UTC

Technical Analysis

CVE-2024-0297 is a critical security vulnerability identified in the Totolink N200RE router, specifically in firmware version 9.3.5u.6139_B20201216. The vulnerability resides in the UploadFirmwareFile function within the /cgi-bin/cstecgi.cgi endpoint. It is an OS command injection flaw (CWE-78) that occurs due to improper sanitization of the FileName argument. An attacker can remotely exploit this vulnerability by crafting a malicious request that manipulates the FileName parameter, leading to arbitrary command execution on the underlying operating system with the privileges of the web server process. This vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 7.3 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes potential confidentiality, integrity, and availability compromises, as an attacker could execute arbitrary commands, potentially leading to full device compromise, interception or manipulation of network traffic, or denial of service. The vendor has been contacted but has not responded or issued a patch, and no official remediation is currently available. Although no known exploits are publicly reported yet, the public disclosure of the vulnerability and its critical nature make it likely that exploitation attempts could emerge rapidly. This vulnerability is particularly concerning because routers like the Totolink N200RE are often deployed in home and small office environments, where security monitoring and patching are less rigorous, increasing the risk of widespread exploitation.

Potential Impact

For European organizations, the exploitation of CVE-2024-0297 could have significant consequences. Compromised routers can serve as entry points into internal networks, allowing attackers to intercept sensitive communications, manipulate traffic, or pivot to other devices. This could lead to data breaches, espionage, or disruption of business operations. Small and medium enterprises (SMEs) and home office setups using the affected Totolink N200RE firmware are particularly vulnerable due to typically weaker security postures and lack of dedicated IT security staff. The integrity and availability of network services could be severely impacted, especially if attackers deploy malware or ransomware through compromised routers. Additionally, given the lack of vendor response and patches, organizations may face prolonged exposure, increasing the window for attackers to exploit this vulnerability. The threat also extends to critical infrastructure sectors that rely on such networking equipment for connectivity, potentially affecting operational continuity.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate and specific actions to mitigate risk: 1) Identify and inventory all Totolink N200RE devices running the vulnerable firmware version (9.3.5u.6139_B20201216). 2) Where possible, isolate these devices from critical internal networks and restrict management interfaces to trusted IP addresses only. 3) Disable remote management features or restrict access to the /cgi-bin/cstecgi.cgi endpoint if feasible via firewall rules or router configuration. 4) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or command injection patterns. 5) Consider replacing vulnerable devices with models from vendors that provide timely security updates and support. 6) Implement network segmentation to limit the impact of a compromised router. 7) Educate users and administrators about the risks and signs of compromise. 8) Stay alert for vendor updates or community-developed patches and apply them promptly once available. 9) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or related exploitation techniques.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-07T09:15:26.403Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6878

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:40:03 PM

Last updated: 8/17/2025, 2:39:59 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats