CVE-2024-0577: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250793 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0577 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically affecting firmware version 9.1.0u.6619_B20230130. The flaw exists in the setLanguageCfg function within the /cgi-bin/cstecgi.cgi endpoint, where improper handling of the 'lang' argument allows an attacker to overflow the stack buffer. This vulnerability can be exploited remotely without user interaction, requiring only low privileges (PR:L) on the device. The overflow can lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the device. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, and no user interaction needed. Although the vendor has been contacted, no patch or official response has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit details increases the risk of exploitation by threat actors targeting vulnerable devices. Given the critical nature of the flaw and the common use of Totolink LR1200GB routers in small to medium enterprises and home networks, this vulnerability poses a significant threat to network security.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, unauthorized access to internal systems, and potential lateral movement within corporate networks. The loss of router integrity and availability could disrupt business operations, especially for organizations relying on these devices for internet connectivity or VPN termination. Additionally, compromised routers could be leveraged as footholds for launching further attacks or as part of botnets, amplifying the threat landscape. The lack of vendor response and patch availability increases the window of exposure, making timely mitigation critical. Organizations in Europe with Totolink LR1200GB devices in their infrastructure face heightened risk, particularly those in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately identify and inventory all Totolink LR1200GB devices running the vulnerable firmware version. Network segmentation should be enforced to isolate these devices from sensitive internal systems. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses and disabling remote management if not essential. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi endpoints. Consider deploying web application firewalls (WAF) with custom rules to detect and block malformed 'lang' parameter inputs indicative of exploitation attempts. Where possible, replace vulnerable devices with alternative models from vendors with active security support. Regularly monitor threat intelligence feeds for updates on exploit developments and vendor patches. Finally, implement strict logging and alerting on router access and anomalous behavior to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0577: CWE-121 Stack-based Buffer Overflow in Totolink LR1200GB
Description
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250793 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0577 is a critical stack-based buffer overflow vulnerability identified in the Totolink LR1200GB router, specifically affecting firmware version 9.1.0u.6619_B20230130. The flaw exists in the setLanguageCfg function within the /cgi-bin/cstecgi.cgi endpoint, where improper handling of the 'lang' argument allows an attacker to overflow the stack buffer. This vulnerability can be exploited remotely without user interaction, requiring only low privileges (PR:L) on the device. The overflow can lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the device. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, and no user interaction needed. Although the vendor has been contacted, no patch or official response has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit details increases the risk of exploitation by threat actors targeting vulnerable devices. Given the critical nature of the flaw and the common use of Totolink LR1200GB routers in small to medium enterprises and home networks, this vulnerability poses a significant threat to network security.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, unauthorized access to internal systems, and potential lateral movement within corporate networks. The loss of router integrity and availability could disrupt business operations, especially for organizations relying on these devices for internet connectivity or VPN termination. Additionally, compromised routers could be leveraged as footholds for launching further attacks or as part of botnets, amplifying the threat landscape. The lack of vendor response and patch availability increases the window of exposure, making timely mitigation critical. Organizations in Europe with Totolink LR1200GB devices in their infrastructure face heightened risk, particularly those in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately identify and inventory all Totolink LR1200GB devices running the vulnerable firmware version. Network segmentation should be enforced to isolate these devices from sensitive internal systems. Access to the router's management interface should be restricted using firewall rules, allowing only trusted IP addresses and disabling remote management if not essential. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious requests targeting /cgi-bin/cstecgi.cgi endpoints. Consider deploying web application firewalls (WAF) with custom rules to detect and block malformed 'lang' parameter inputs indicative of exploitation attempts. Where possible, replace vulnerable devices with alternative models from vendors with active security support. Regularly monitor threat intelligence feeds for updates on exploit developments and vendor patches. Finally, implement strict logging and alerting on router access and anomalous behavior to enable rapid incident response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-16T07:06:30.084Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dc31f182aa0cae24a0515
Added to database: 6/2/2025, 3:28:31 PM
Last enriched: 7/3/2025, 4:12:22 PM
Last updated: 7/29/2025, 2:31:32 AM
Views: 15
Related Threats
CVE-2025-8988: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumCVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.