Skip to main content

CVE-2024-0574: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB

High
VulnerabilityCVE-2024-0574cvecve-2024-0574cwe-121
Published: Tue Jan 16 2024 (01/16/2024, 15:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: LR1200GB

Description

A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:12:38 UTC

Technical Analysis

CVE-2024-0574 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The flaw resides in the setParentalRules function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the sTime argument, allowing an attacker to manipulate input data to overflow the stack buffer. Such a buffer overflow can lead to arbitrary code execution, potentially allowing remote attackers to gain control over the device without user interaction. The vulnerability is remotely exploitable over the network, requiring only low privileges (PR:L) but no user interaction (UI:N). The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full compromise of the router. Notably, the vendor has not responded to early disclosure attempts, and no patches or mitigations have been released yet. Although public exploits have been disclosed, there are no confirmed reports of active exploitation in the wild at this time. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow issue, which is a well-understood and severe class of memory corruption bugs. The affected product, Totolink LR1200GB, is a consumer and small business router, which may be deployed in various environments including home offices and small enterprises.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium-sized enterprises (SMEs) and home office setups that rely on Totolink LR1200GB routers. Exploitation could lead to complete device takeover, enabling attackers to intercept, modify, or disrupt network traffic, steal sensitive data, or use the compromised router as a foothold for lateral movement within corporate networks. Given the router’s role as a network gateway, compromise could also facilitate man-in-the-middle attacks, DNS hijacking, or persistent backdoors. The lack of vendor response and absence of patches increases the window of exposure, raising the likelihood of exploitation once public exploits become widespread. Additionally, the high severity and remote exploitability without user interaction make this vulnerability particularly dangerous. Organizations with limited IT security resources may be disproportionately affected, as they might not detect or respond to such intrusions promptly. The potential impact extends beyond confidentiality and integrity to availability, as attackers could disrupt network services by crashing or destabilizing the device.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate affected Totolink LR1200GB devices from critical internal networks and restrict management interface access to trusted IP addresses only, preferably via VPN or secure management VLANs. Disable or restrict access to the /cgi-bin/cstecgi.cgi interface if possible, or employ web application firewalls (WAFs) to detect and block suspicious requests targeting the setParentalRules function. Network segmentation should be enforced to limit the impact of a compromised router. Regularly monitor network traffic for anomalies indicative of exploitation attempts, such as unusual POST requests or unexpected device behavior. Organizations should also inventory their network devices to identify affected models and firmware versions promptly. Where feasible, replace vulnerable devices with alternatives from vendors with active security support. Finally, maintain heightened awareness for emerging exploits and vendor advisories, applying patches immediately once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-16T07:06:19.939Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a0513

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:12:38 PM

Last updated: 7/26/2025, 12:35:12 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats