CVE-2024-0570: CWE-284 Improper Access Controls in Totolink N350RT
A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6265. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. It is recommended to upgrade the affected component. VDB-250786 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0570 is a vulnerability identified in the Totolink N350RT router, specifically affecting firmware version 9.3.5u.6265. The flaw resides in the /cgi-bin/cstecgi.cgi component, which is part of the device's Setting Handler functionality. The vulnerability is classified under CWE-284, indicating improper access control mechanisms. This means that the affected component does not adequately restrict access to sensitive functions or data, allowing an attacker to bypass intended security controls. The vulnerability can be exploited remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact on confidentiality, integrity, and availability is low individually but combined they present a medium overall severity with a CVSS score of 6.9. The lack of authentication and remote exploitability means attackers can potentially manipulate device settings or gain unauthorized access to configuration interfaces, which could lead to further compromise of network security or device functionality. No known exploits are currently reported in the wild, and no official patches have been linked yet, though upgrading the affected component is recommended once available. The vulnerability does not require user interaction, increasing the risk of automated or widespread exploitation if weaponized. Given the device’s role as a network router, exploitation could lead to unauthorized network configuration changes, interception or redirection of traffic, or denial of service conditions.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises or home office environments relying on Totolink N350RT routers for network connectivity. Unauthorized access to router settings can allow attackers to alter DNS configurations, redirect traffic to malicious sites, or disable security features, potentially leading to data interception, credential theft, or network downtime. In environments where these routers are used as part of critical infrastructure or in branch offices, such compromises could disrupt business operations or expose sensitive data. The medium severity rating reflects the potential for moderate damage, particularly if attackers chain this vulnerability with others to escalate privileges or move laterally within a network. Since the vulnerability is remotely exploitable without authentication, it poses a risk of automated scanning and exploitation campaigns targeting exposed devices on the internet or within poorly segmented internal networks. Organizations with limited IT security resources may be particularly vulnerable to exploitation due to lack of timely patching or device replacement.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all Totolink N350RT devices running firmware version 9.3.5u.6265 within their networks. Immediate steps include isolating these devices from direct internet exposure by placing them behind firewalls or VPNs and restricting access to management interfaces to trusted IP addresses only. Network segmentation should be enforced to limit the impact of potential compromise. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts early. Since no official patch is currently linked, organizations should regularly check Totolink’s official channels for firmware updates addressing this issue and apply them promptly once available. If upgrading firmware is not immediately possible, consider replacing vulnerable devices with models from vendors with stronger security track records. Additionally, disabling remote management features or changing default credentials (if applicable) can reduce attack surface. Employing intrusion detection/prevention systems (IDS/IPS) to flag suspicious requests to the /cgi-bin/cstecgi.cgi endpoint may also help mitigate exploitation risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2024-0570: CWE-284 Improper Access Controls in Totolink N350RT
Description
A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6265. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. It is recommended to upgrade the affected component. VDB-250786 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0570 is a vulnerability identified in the Totolink N350RT router, specifically affecting firmware version 9.3.5u.6265. The flaw resides in the /cgi-bin/cstecgi.cgi component, which is part of the device's Setting Handler functionality. The vulnerability is classified under CWE-284, indicating improper access control mechanisms. This means that the affected component does not adequately restrict access to sensitive functions or data, allowing an attacker to bypass intended security controls. The vulnerability can be exploited remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact on confidentiality, integrity, and availability is low individually but combined they present a medium overall severity with a CVSS score of 6.9. The lack of authentication and remote exploitability means attackers can potentially manipulate device settings or gain unauthorized access to configuration interfaces, which could lead to further compromise of network security or device functionality. No known exploits are currently reported in the wild, and no official patches have been linked yet, though upgrading the affected component is recommended once available. The vulnerability does not require user interaction, increasing the risk of automated or widespread exploitation if weaponized. Given the device’s role as a network router, exploitation could lead to unauthorized network configuration changes, interception or redirection of traffic, or denial of service conditions.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises or home office environments relying on Totolink N350RT routers for network connectivity. Unauthorized access to router settings can allow attackers to alter DNS configurations, redirect traffic to malicious sites, or disable security features, potentially leading to data interception, credential theft, or network downtime. In environments where these routers are used as part of critical infrastructure or in branch offices, such compromises could disrupt business operations or expose sensitive data. The medium severity rating reflects the potential for moderate damage, particularly if attackers chain this vulnerability with others to escalate privileges or move laterally within a network. Since the vulnerability is remotely exploitable without authentication, it poses a risk of automated scanning and exploitation campaigns targeting exposed devices on the internet or within poorly segmented internal networks. Organizations with limited IT security resources may be particularly vulnerable to exploitation due to lack of timely patching or device replacement.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all Totolink N350RT devices running firmware version 9.3.5u.6265 within their networks. Immediate steps include isolating these devices from direct internet exposure by placing them behind firewalls or VPNs and restricting access to management interfaces to trusted IP addresses only. Network segmentation should be enforced to limit the impact of potential compromise. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts early. Since no official patch is currently linked, organizations should regularly check Totolink’s official channels for firmware updates addressing this issue and apply them promptly once available. If upgrading firmware is not immediately possible, consider replacing vulnerable devices with models from vendors with stronger security track records. Additionally, disabling remote management features or changing default credentials (if applicable) can reduce attack surface. Employing intrusion detection/prevention systems (IDS/IPS) to flag suspicious requests to the /cgi-bin/cstecgi.cgi endpoint may also help mitigate exploitation risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T07:06:06.754Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7523
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 12:27:16 AM
Last updated: 8/15/2025, 11:50:58 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.