CVE-2024-0576: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been declared as critical. This vulnerability affects the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sPort leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0576 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The vulnerability resides in the function setIpPortFilterRules within the /cgi-bin/cstecgi.cgi file. The flaw is triggered by improper handling of the sPort argument, which allows an attacker to overflow the stack buffer. This type of vulnerability (CWE-121) can lead to arbitrary code execution, denial of service, or complete system compromise. The attack vector is remote and requires low attack complexity, with no user interaction needed. Although the vulnerability requires some level of privileges (PR:L), it can be exploited over the network (AV:N) without user interaction (UI:N). The CVSS v3.1 score is 8.8, indicating a high severity with potential for high confidentiality, integrity, and availability impact. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Public exploit code has been disclosed, increasing the risk of exploitation. The vulnerability affects a widely used consumer and small business router model, which is often deployed in home and office environments, making it a significant threat vector for network perimeter compromise.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. The Totolink LR1200GB is commonly used in small to medium enterprises and residential settings, which can serve as entry points into corporate networks if connected to internal resources or VPNs. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to network infiltration, data exfiltration, or disruption of network services. Given the critical nature of the vulnerability and the lack of vendor response, organizations face increased risk of targeted attacks or opportunistic exploitation. Compromise of these routers could undermine network security, enabling lateral movement and persistence within affected environments. Additionally, the vulnerability could be leveraged to launch distributed denial-of-service (DDoS) attacks or as part of botnets, further amplifying its impact on availability and broader internet infrastructure.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Totolink LR1200GB devices from critical network segments to limit potential lateral movement. 2. Disable remote management interfaces, especially access to /cgi-bin/cstecgi.cgi, if possible, to reduce exposure. 3. Monitor network traffic for unusual patterns or attempts to exploit the sPort parameter, employing intrusion detection systems with custom signatures targeting this vulnerability. 4. Replace or upgrade affected devices where feasible, prioritizing models with active vendor support and security updates. 5. Implement strict access controls and network-level firewalls to restrict access to router management interfaces to trusted IPs only. 6. Regularly audit router firmware versions and configurations to identify and remediate vulnerable devices. 7. Engage with Totolink or third-party security providers for potential unofficial patches or mitigations until an official fix is released. 8. Educate IT staff about this vulnerability and ensure incident response plans include detection and containment strategies for router compromises.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2024-0576: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
Description
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been declared as critical. This vulnerability affects the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sPort leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0576 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically in firmware version 9.1.0u.6619_B20230130. The vulnerability resides in the function setIpPortFilterRules within the /cgi-bin/cstecgi.cgi file. The flaw is triggered by improper handling of the sPort argument, which allows an attacker to overflow the stack buffer. This type of vulnerability (CWE-121) can lead to arbitrary code execution, denial of service, or complete system compromise. The attack vector is remote and requires low attack complexity, with no user interaction needed. Although the vulnerability requires some level of privileges (PR:L), it can be exploited over the network (AV:N) without user interaction (UI:N). The CVSS v3.1 score is 8.8, indicating a high severity with potential for high confidentiality, integrity, and availability impact. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Public exploit code has been disclosed, increasing the risk of exploitation. The vulnerability affects a widely used consumer and small business router model, which is often deployed in home and office environments, making it a significant threat vector for network perimeter compromise.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. The Totolink LR1200GB is commonly used in small to medium enterprises and residential settings, which can serve as entry points into corporate networks if connected to internal resources or VPNs. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to network infiltration, data exfiltration, or disruption of network services. Given the critical nature of the vulnerability and the lack of vendor response, organizations face increased risk of targeted attacks or opportunistic exploitation. Compromise of these routers could undermine network security, enabling lateral movement and persistence within affected environments. Additionally, the vulnerability could be leveraged to launch distributed denial-of-service (DDoS) attacks or as part of botnets, further amplifying its impact on availability and broader internet infrastructure.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Totolink LR1200GB devices from critical network segments to limit potential lateral movement. 2. Disable remote management interfaces, especially access to /cgi-bin/cstecgi.cgi, if possible, to reduce exposure. 3. Monitor network traffic for unusual patterns or attempts to exploit the sPort parameter, employing intrusion detection systems with custom signatures targeting this vulnerability. 4. Replace or upgrade affected devices where feasible, prioritizing models with active vendor support and security updates. 5. Implement strict access controls and network-level firewalls to restrict access to router management interfaces to trusted IPs only. 6. Regularly audit router firmware versions and configurations to identify and remediate vulnerable devices. 7. Engage with Totolink or third-party security providers for potential unofficial patches or mitigations until an official fix is released. 8. Educate IT staff about this vulnerability and ensure incident response plans include detection and containment strategies for router compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T07:06:26.888Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68443c7f71f4d251b50d0069
Added to database: 6/7/2025, 1:19:59 PM
Last enriched: 7/8/2025, 12:28:50 PM
Last updated: 7/31/2025, 3:06:55 AM
Views: 11
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighTop Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.