CVE-2024-0569: CWE-200 Information Disclosure in Totolink T8
A vulnerability classified as problematic has been found in Totolink T8 4.1.5cu.833_20220905. This affects the function getSysStatusCfg of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation of the argument ssid/key leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.5cu.862_B20230228 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-250785 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0569 is a medium-severity information disclosure vulnerability affecting the Totolink T8 router, specifically version 4.1.5cu.833_20220905. The vulnerability resides in the getSysStatusCfg function within the /cgi-bin/cstecgi.cgi file, part of the Setting Handler component. By manipulating the 'ssid/key' argument in a crafted request, an attacker can remotely trigger the vulnerability without requiring authentication or user interaction. This leads to unauthorized disclosure of sensitive system information, which could include configuration details or credentials. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is exposed to an unauthorized actor. The CVSS 4.0 base score is 5.3, reflecting a medium risk primarily due to its remote exploitability without authentication but limited impact on confidentiality (low impact). The vendor has released an updated firmware version 4.1.5cu.862_B20230228 that addresses this issue, and upgrading is recommended to mitigate the risk. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts.
Potential Impact
For European organizations using Totolink T8 routers, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks such as network intrusion, credential theft, or configuration manipulation. Information disclosure vulnerabilities can be leveraged by attackers to map network topology, identify security configurations, or harvest credentials, which may lead to more severe compromises. In environments where Totolink T8 devices are deployed at branch offices, small businesses, or remote sites, attackers could remotely exploit this flaw to gain insight into network settings without physical access or user interaction. This could undermine network security posture and potentially expose confidential data or disrupt business operations. Given the medium severity and ease of exploitation, organizations should prioritize patching to prevent reconnaissance activities that precede more damaging attacks.
Mitigation Recommendations
European organizations should immediately verify if their network infrastructure includes Totolink T8 routers running the vulnerable firmware version 4.1.5cu.833_20220905. The primary mitigation is to upgrade the firmware to version 4.1.5cu.862_B20230228 or later, which contains the fix. Until the upgrade is applied, network administrators should restrict remote access to the router's management interface, ideally limiting it to trusted IP addresses or disabling remote management entirely. Implement network segmentation to isolate vulnerable devices from critical assets. Monitor network traffic for unusual requests targeting /cgi-bin/cstecgi.cgi endpoints, particularly those manipulating 'ssid/key' parameters, to detect potential exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation patterns. Additionally, review and harden router configurations by disabling unnecessary services and enforcing strong administrative credentials. Regularly audit firmware versions and maintain an asset inventory to quickly identify and remediate vulnerable devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0569: CWE-200 Information Disclosure in Totolink T8
Description
A vulnerability classified as problematic has been found in Totolink T8 4.1.5cu.833_20220905. This affects the function getSysStatusCfg of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation of the argument ssid/key leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.5cu.862_B20230228 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-250785 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0569 is a medium-severity information disclosure vulnerability affecting the Totolink T8 router, specifically version 4.1.5cu.833_20220905. The vulnerability resides in the getSysStatusCfg function within the /cgi-bin/cstecgi.cgi file, part of the Setting Handler component. By manipulating the 'ssid/key' argument in a crafted request, an attacker can remotely trigger the vulnerability without requiring authentication or user interaction. This leads to unauthorized disclosure of sensitive system information, which could include configuration details or credentials. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is exposed to an unauthorized actor. The CVSS 4.0 base score is 5.3, reflecting a medium risk primarily due to its remote exploitability without authentication but limited impact on confidentiality (low impact). The vendor has released an updated firmware version 4.1.5cu.862_B20230228 that addresses this issue, and upgrading is recommended to mitigate the risk. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts.
Potential Impact
For European organizations using Totolink T8 routers, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks such as network intrusion, credential theft, or configuration manipulation. Information disclosure vulnerabilities can be leveraged by attackers to map network topology, identify security configurations, or harvest credentials, which may lead to more severe compromises. In environments where Totolink T8 devices are deployed at branch offices, small businesses, or remote sites, attackers could remotely exploit this flaw to gain insight into network settings without physical access or user interaction. This could undermine network security posture and potentially expose confidential data or disrupt business operations. Given the medium severity and ease of exploitation, organizations should prioritize patching to prevent reconnaissance activities that precede more damaging attacks.
Mitigation Recommendations
European organizations should immediately verify if their network infrastructure includes Totolink T8 routers running the vulnerable firmware version 4.1.5cu.833_20220905. The primary mitigation is to upgrade the firmware to version 4.1.5cu.862_B20230228 or later, which contains the fix. Until the upgrade is applied, network administrators should restrict remote access to the router's management interface, ideally limiting it to trusted IP addresses or disabling remote management entirely. Implement network segmentation to isolate vulnerable devices from critical assets. Monitor network traffic for unusual requests targeting /cgi-bin/cstecgi.cgi endpoints, particularly those manipulating 'ssid/key' parameters, to detect potential exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation patterns. Additionally, review and harden router configurations by disabling unnecessary services and enforcing strong administrative credentials. Regularly audit firmware versions and maintain an asset inventory to quickly identify and remediate vulnerable devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T07:06:04.505Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683dc31f182aa0cae24a0511
Added to database: 6/2/2025, 3:28:31 PM
Last enriched: 7/3/2025, 4:13:24 PM
Last updated: 8/9/2025, 6:44:08 PM
Views: 11
Related Threats
CVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8898: CWE-862 Missing Authorization in magepeopleteam E-cab Taxi Booking Manager for Woocommerce
CriticalCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.