CVE-2024-0299: CWE-78 OS Command Injection in Totolink N200RE
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0299 is a critical security vulnerability identified in the Totolink N200RE router firmware version 9.3.5u.6139_B20201216. The flaw exists in the setTracerouteCfg function within the /cgi-bin/cstecgi.cgi file, where improper sanitization of the 'command' argument allows an attacker to perform OS command injection. This vulnerability is remotely exploitable without requiring authentication or user interaction, meaning an attacker can send crafted requests directly to the vulnerable endpoint to execute arbitrary operating system commands on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), which typically leads to full system compromise. The CVSS v3.1 base score is 7.3, indicating a high severity level, with the vector reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vendor Totolink was contacted but did not respond or provide a patch, and no official patch links are available. Although no known exploits in the wild have been reported yet, the public disclosure of the exploit code increases the risk of active exploitation. This vulnerability could allow attackers to take control of affected routers, potentially leading to network traffic interception, device manipulation, or pivoting to internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those using Totolink N200RE routers in their network infrastructure. Successful exploitation could lead to unauthorized access to network devices, enabling attackers to intercept sensitive communications, disrupt network availability, or use compromised routers as footholds for further attacks within corporate networks. Small and medium enterprises (SMEs) and home office setups that rely on consumer-grade routers like the Totolink N200RE are particularly vulnerable due to limited network segmentation and security monitoring. The compromise of these devices could also facilitate large-scale botnet recruitment or be leveraged in distributed denial-of-service (DDoS) attacks affecting critical services. Given the lack of vendor response and patches, the window of exposure remains open, increasing the urgency for European organizations to take proactive measures. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and a breach resulting from this vulnerability could lead to compliance violations and reputational damage.
Mitigation Recommendations
Since no official patch is currently available from Totolink, European organizations should implement immediate compensating controls. First, isolate affected Totolink N200RE devices from critical network segments and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable remote management features if not strictly necessary. Employ network-level intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi or unusual traceroute configuration commands. Regularly audit router configurations and logs for signs of compromise. Where feasible, replace vulnerable devices with routers from vendors that provide timely security updates and have a strong security track record. Additionally, implement network segmentation to limit the impact of any device compromise and enforce strict access controls. Educate IT staff about this vulnerability to ensure rapid detection and response. Finally, monitor threat intelligence feeds for any emerging exploits or patches related to CVE-2024-0299.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2024-0299: CWE-78 OS Command Injection in Totolink N200RE
Description
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0299 is a critical security vulnerability identified in the Totolink N200RE router firmware version 9.3.5u.6139_B20201216. The flaw exists in the setTracerouteCfg function within the /cgi-bin/cstecgi.cgi file, where improper sanitization of the 'command' argument allows an attacker to perform OS command injection. This vulnerability is remotely exploitable without requiring authentication or user interaction, meaning an attacker can send crafted requests directly to the vulnerable endpoint to execute arbitrary operating system commands on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), which typically leads to full system compromise. The CVSS v3.1 base score is 7.3, indicating a high severity level, with the vector reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vendor Totolink was contacted but did not respond or provide a patch, and no official patch links are available. Although no known exploits in the wild have been reported yet, the public disclosure of the exploit code increases the risk of active exploitation. This vulnerability could allow attackers to take control of affected routers, potentially leading to network traffic interception, device manipulation, or pivoting to internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those using Totolink N200RE routers in their network infrastructure. Successful exploitation could lead to unauthorized access to network devices, enabling attackers to intercept sensitive communications, disrupt network availability, or use compromised routers as footholds for further attacks within corporate networks. Small and medium enterprises (SMEs) and home office setups that rely on consumer-grade routers like the Totolink N200RE are particularly vulnerable due to limited network segmentation and security monitoring. The compromise of these devices could also facilitate large-scale botnet recruitment or be leveraged in distributed denial-of-service (DDoS) attacks affecting critical services. Given the lack of vendor response and patches, the window of exposure remains open, increasing the urgency for European organizations to take proactive measures. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and a breach resulting from this vulnerability could lead to compliance violations and reputational damage.
Mitigation Recommendations
Since no official patch is currently available from Totolink, European organizations should implement immediate compensating controls. First, isolate affected Totolink N200RE devices from critical network segments and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable remote management features if not strictly necessary. Employ network-level intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi or unusual traceroute configuration commands. Regularly audit router configurations and logs for signs of compromise. Where feasible, replace vulnerable devices with routers from vendors that provide timely security updates and have a strong security track record. Additionally, implement network segmentation to limit the impact of any device compromise and enforce strict access controls. Educate IT staff about this vulnerability to ensure rapid detection and response. Finally, monitor threat intelligence feeds for any emerging exploits or patches related to CVE-2024-0299.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-07T09:15:34.795Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff41a
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 12:09:55 AM
Last updated: 8/1/2025, 12:07:19 AM
Views: 10
Related Threats
CVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.