CVE-2024-0574: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0574 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The flaw resides in the setParentalRules function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the sTime argument, allowing an attacker to manipulate input data to overflow the stack buffer. Such a buffer overflow can lead to arbitrary code execution, potentially allowing remote attackers to gain control over the device without user interaction. The vulnerability is remotely exploitable over the network, requiring only low privileges (PR:L) but no user interaction (UI:N). The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full compromise of the router. Notably, the vendor has not responded to early disclosure attempts, and no patches or mitigations have been released yet. Although public exploits have been disclosed, there are no confirmed reports of active exploitation in the wild at this time. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow issue, which is a well-understood and severe class of memory corruption bugs. The affected product, Totolink LR1200GB, is a consumer and small business router, which may be deployed in various environments including home offices and small enterprises.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium-sized enterprises (SMEs) and home office setups that rely on Totolink LR1200GB routers. Exploitation could lead to complete device takeover, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive data, or use the compromised router as a foothold for lateral movement within corporate networks. Given the router’s role as a network gateway, compromise could also facilitate man-in-the-middle attacks, DNS hijacking, or persistent backdoors. The lack of vendor response and absence of patches increases the window of exposure, raising the likelihood of exploitation once public exploits become widespread. Additionally, the high severity and remote exploitability without user interaction make this vulnerability particularly dangerous. Organizations with limited IT security resources may be disproportionately affected, as they might not detect or respond to such intrusions promptly. The potential impact extends beyond confidentiality and integrity to availability, as attackers could disrupt network services by crashing or destabilizing the device.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate affected Totolink LR1200GB devices from critical internal networks and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable or restrict access to the /cgi-bin/cstecgi.cgi interface if possible, or employ web application firewalls (WAFs) to detect and block suspicious requests targeting the setParentalRules function. Network segmentation should be enforced to limit the impact of a compromised router. Regularly monitor network traffic for anomalies indicative of exploitation attempts, such as unusual POST requests or unexpected device behavior. Organizations should also inventory their network devices to identify affected models and firmware versions promptly. Where feasible, replace vulnerable devices with alternatives from vendors with active security support. Finally, maintain heightened awareness for emerging exploits and vendor advisories, applying patches immediately once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0574: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
Description
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0574 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The flaw resides in the setParentalRules function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the sTime argument, allowing an attacker to manipulate input data to overflow the stack buffer. Such a buffer overflow can lead to arbitrary code execution, potentially allowing remote attackers to gain control over the device without user interaction. The vulnerability is remotely exploitable over the network, requiring only low privileges (PR:L) but no user interaction (UI:N). The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full compromise of the router. Notably, the vendor has not responded to early disclosure attempts, and no patches or mitigations have been released yet. Although public exploits have been disclosed, there are no confirmed reports of active exploitation in the wild at this time. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow issue, which is a well-understood and severe class of memory corruption bugs. The affected product, Totolink LR1200GB, is a consumer and small business router, which may be deployed in various environments including home offices and small enterprises.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium-sized enterprises (SMEs) and home office setups that rely on Totolink LR1200GB routers. Exploitation could lead to complete device takeover, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive data, or use the compromised router as a foothold for lateral movement within corporate networks. Given the router’s role as a network gateway, compromise could also facilitate man-in-the-middle attacks, DNS hijacking, or persistent backdoors. The lack of vendor response and absence of patches increases the window of exposure, raising the likelihood of exploitation once public exploits become widespread. Additionally, the high severity and remote exploitability without user interaction make this vulnerability particularly dangerous. Organizations with limited IT security resources may be disproportionately affected, as they might not detect or respond to such intrusions promptly. The potential impact extends beyond confidentiality and integrity to availability, as attackers could disrupt network services by crashing or destabilizing the device.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate affected Totolink LR1200GB devices from critical internal networks and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable or restrict access to the /cgi-bin/cstecgi.cgi interface if possible, or employ web application firewalls (WAFs) to detect and block suspicious requests targeting the setParentalRules function. Network segmentation should be enforced to limit the impact of a compromised router. Regularly monitor network traffic for anomalies indicative of exploitation attempts, such as unusual POST requests or unexpected device behavior. Organizations should also inventory their network devices to identify affected models and firmware versions promptly. Where feasible, replace vulnerable devices with alternatives from vendors with active security support. Finally, maintain heightened awareness for emerging exploits and vendor advisories, applying patches immediately once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T07:06:19.939Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dc31f182aa0cae24a0513
Added to database: 6/2/2025, 3:28:31 PM
Last enriched: 7/3/2025, 4:12:38 PM
Last updated: 7/26/2025, 12:35:12 AM
Views: 13
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.