Skip to main content

CVE-2024-0577: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB

High
VulnerabilityCVE-2024-0577cvecve-2024-0577cwe-121
Published: Tue Jan 16 2024 (01/16/2024, 15:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: LR1200GB

Description

A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250793 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:12:22 UTC

Technical Analysis

CVE-2024-0577 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically affecting firmware version 9.1.0u.6619_B20230130. The flaw exists in the setLanguageCfg function within the /cgi-bin/cstecgi.cgi endpoint, where improper handling of the 'lang' argument allows an attacker to overflow the stack buffer. This vulnerability can be exploited remotely without user interaction, requiring only low privileges (PR:L) on the device. The overflow can lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the device. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, and no user interaction needed. Although the vendor has been contacted, no patch or official response has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit details increases the risk of exploitation by threat actors targeting vulnerable devices. Given the critical nature of the flaw and the common use of Totolink LR1200GB routers in small to medium enterprises and home networks, this vulnerability poses a significant threat to network security.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, unauthorized access to internal systems, and potential lateral movement within corporate networks. The loss of router integrity and availability could disrupt business operations, especially for organizations relying on these devices for internet connectivity or VPN termination. Additionally, compromised routers could be leveraged as footholds for launching further attacks or as part of botnets, amplifying the threat landscape. The lack of vendor response and patch availability increases the window of exposure, making timely mitigation critical. Organizations in Europe with Totolink LR1200GB devices in their infrastructure face heightened risk, particularly those in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately identify and inventory all Totolink LR1200GB devices running the vulnerable firmware version. Network segmentation should be enforced to isolate these devices from sensitive internal systems. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses and disabling remote management if not essential. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi endpoints. Consider deploying web application firewalls (WAF) with custom rules to detect and block malformed 'lang' parameter inputs indicative of exploitation attempts. Where possible, replace vulnerable devices with alternative models from vendors with active security support. Regularly monitor threat intelligence feeds for updates on exploit developments and vendor patches. Finally, implement strict logging and alerting on router access and anomalous behavior to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-16T07:06:30.084Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a0515

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:12:22 PM

Last updated: 7/29/2025, 2:31:32 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats