Skip to main content

CVE-2024-0569: CWE-200 Information Disclosure in Totolink T8

Medium
VulnerabilityCVE-2024-0569cvecve-2024-0569cwe-200
Published: Tue Jan 16 2024 (01/16/2024, 12:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: T8

Description

A vulnerability classified as problematic has been found in Totolink T8 4.1.5cu.833_20220905. This affects the function getSysStatusCfg of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation of the argument ssid/key leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.5cu.862_B20230228 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-250785 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:13:24 UTC

Technical Analysis

CVE-2024-0569 is a medium-severity information disclosure vulnerability affecting the Totolink T8 router, specifically version 4.1.5cu.833_20220905. The vulnerability resides in the getSysStatusCfg function within the /cgi-bin/cstecgi.cgi file, part of the Setting Handler component. By manipulating the 'ssid/key' argument in a crafted request, an attacker can remotely trigger the vulnerability without requiring authentication or user interaction. This leads to unauthorized disclosure of sensitive system information, which could include configuration details or credentials. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is exposed to an unauthorized actor. The CVSS 4.0 base score is 5.3, reflecting a medium risk primarily due to its remote exploitability without authentication but limited impact on confidentiality (low impact). The vendor has released an updated firmware version 4.1.5cu.862_B20230228 that addresses this issue, and upgrading is recommended to mitigate the risk. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts.

Potential Impact

For European organizations using Totolink T8 routers, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks such as network intrusion, credential theft, or configuration manipulation. Information disclosure vulnerabilities can be leveraged by attackers to map network topology, identify security configurations, or harvest credentials, which may lead to more severe compromises. In environments where Totolink T8 devices are deployed at branch offices, small businesses, or remote sites, attackers could remotely exploit this flaw to gain insight into network settings without physical access or user interaction. This could undermine network security posture and potentially expose confidential data or disrupt business operations. Given the medium severity and ease of exploitation, organizations should prioritize patching to prevent reconnaissance activities that precede more damaging attacks.

Mitigation Recommendations

European organizations should immediately verify if their network infrastructure includes Totolink T8 routers running the vulnerable firmware version 4.1.5cu.833_20220905. The primary mitigation is to upgrade the firmware to version 4.1.5cu.862_B20230228 or later, which contains the fix. Until the upgrade is applied, network administrators should restrict remote access to the router's management interface, ideally limiting it to trusted IP addresses or disabling remote management entirely. Implement network segmentation to isolate vulnerable devices from critical assets. Monitor network traffic for unusual requests targeting /cgi-bin/cstecgi.cgi endpoints, particularly those manipulating 'ssid/key' parameters, to detect potential exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation patterns. Additionally, review and harden router configurations by disabling unnecessary services and enforcing strong administrative credentials. Regularly audit firmware versions and maintain an asset inventory to quickly identify and remediate vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-16T07:06:04.505Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a0511

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:13:24 PM

Last updated: 8/9/2025, 6:44:08 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats