Skip to main content

CVE-2024-0299: CWE-78 OS Command Injection in Totolink N200RE

High
VulnerabilityCVE-2024-0299cvecve-2024-0299cwe-78
Published: Mon Jan 08 2024 (01/08/2024, 05:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: N200RE

Description

A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:09:55 UTC

Technical Analysis

CVE-2024-0299 is a critical security vulnerability identified in the Totolink N200RE router firmware version 9.3.5u.6139_B20201216. The flaw exists in the setTracerouteCfg function within the /cgi-bin/cstecgi.cgi file, where improper sanitization of the 'command' argument allows an attacker to perform OS command injection. This vulnerability is remotely exploitable without requiring authentication or user interaction, meaning an attacker can send crafted requests directly to the vulnerable endpoint to execute arbitrary operating system commands on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), which typically leads to full system compromise. The CVSS v3.1 base score is 7.3, indicating a high severity level, with the vector reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vendor Totolink was contacted but did not respond or provide a patch, and no official patch links are available. Although no known exploits in the wild have been reported yet, the public disclosure of the exploit code increases the risk of active exploitation. This vulnerability could allow attackers to take control of affected routers, potentially leading to network traffic interception, device manipulation, or pivoting to internal networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Totolink N200RE routers in their network infrastructure. Successful exploitation could lead to unauthorized access to network devices, enabling attackers to intercept sensitive communications, disrupt network availability, or use compromised routers as footholds for further attacks within corporate networks. Small and medium enterprises (SMEs) and home office setups that rely on consumer-grade routers like the Totolink N200RE are particularly vulnerable due to limited network segmentation and security monitoring. The compromise of these devices could also facilitate large-scale botnet recruitment or be leveraged in distributed denial-of-service (DDoS) attacks affecting critical services. Given the lack of vendor response and patches, the window of exposure remains open, increasing the urgency for European organizations to take proactive measures. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and a breach resulting from this vulnerability could lead to compliance violations and reputational damage.

Mitigation Recommendations

Since no official patch is currently available from Totolink, European organizations should implement immediate compensating controls. First, isolate affected Totolink N200RE devices from critical network segments and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable remote management features if not strictly necessary. Employ network-level intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi or unusual traceroute configuration commands. Regularly audit router configurations and logs for signs of compromise. Where feasible, replace vulnerable devices with routers from vendors that provide timely security updates and have a strong security track record. Additionally, implement network segmentation to limit the impact of any device compromise and enforce strict access controls. Educate IT staff about this vulnerability to ensure rapid detection and response. Finally, monitor threat intelligence feeds for any emerging exploits or patches related to CVE-2024-0299.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-07T09:15:34.795Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff41a

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 12:09:55 AM

Last updated: 8/1/2025, 12:07:19 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats