CVE-2024-0998: CWE-121 Stack-based Buffer Overflow in Totolink N200RE
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0998 is a critical stack-based buffer overflow vulnerability identified in the Totolink N200RE router, specifically in firmware version 9.3.5u.6139_B20201216. The vulnerability exists in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the 'ip' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. Because the vulnerability is remotely exploitable without user interaction, an attacker can send specially crafted HTTP requests to the affected device to trigger the overflow. The overflow can lead to arbitrary code execution with elevated privileges, potentially allowing full compromise of the router. The CVSS 3.1 base score is 7.2 (high severity), reflecting the network attack vector, low attack complexity, but requiring high privileges (authentication) to exploit. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could manipulate router configurations, intercept or redirect traffic, or cause denial of service. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no exploits are currently known in the wild, public disclosure of the exploit code increases the risk of active exploitation. This vulnerability is a classic example of CWE-121, a stack-based buffer overflow, which remains a critical security risk in embedded network devices like routers.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to small and medium enterprises (SMEs) and home users relying on Totolink N200RE routers for network connectivity. Compromise of these routers can lead to interception of sensitive data, unauthorized network access, lateral movement within corporate networks, and disruption of internet services. Given the router’s role as a network gateway, attackers could manipulate DNS settings to redirect traffic to malicious sites, conduct man-in-the-middle attacks, or deploy malware payloads. The lack of vendor response and patches increases the window of exposure. Critical infrastructure or organizations with remote offices using this router model are particularly vulnerable. Additionally, the requirement for authentication to exploit the vulnerability suggests that attackers may first need to compromise credentials or gain local network access, but once achieved, the impact is severe. The vulnerability could also be leveraged in targeted attacks against European entities, especially where Totolink devices are prevalent.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately audit their networks to identify the presence of Totolink N200RE routers running the vulnerable firmware version. Network administrators should restrict access to the router management interface by limiting it to trusted IP addresses and disabling remote management if enabled. Strong, unique administrative credentials must be enforced to prevent unauthorized authentication. Network segmentation should be applied to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts. Where possible, organizations should consider replacing affected devices with routers from vendors with active security support. Additionally, applying web application firewalls or intrusion prevention systems that can detect and block malformed HTTP requests targeting /cgi-bin/cstecgi.cgi may reduce risk. Finally, organizations should maintain awareness of any future patches or advisories from Totolink or security communities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0998: CWE-121 Stack-based Buffer Overflow in Totolink N200RE
Description
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0998 is a critical stack-based buffer overflow vulnerability identified in the Totolink N200RE router, specifically in firmware version 9.3.5u.6139_B20201216. The vulnerability exists in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the 'ip' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. Because the vulnerability is remotely exploitable without user interaction, an attacker can send specially crafted HTTP requests to the affected device to trigger the overflow. The overflow can lead to arbitrary code execution with elevated privileges, potentially allowing full compromise of the router. The CVSS 3.1 base score is 7.2 (high severity), reflecting the network attack vector, low attack complexity, but requiring high privileges (authentication) to exploit. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could manipulate router configurations, intercept or redirect traffic, or cause denial of service. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no exploits are currently known in the wild, public disclosure of the exploit code increases the risk of active exploitation. This vulnerability is a classic example of CWE-121, a stack-based buffer overflow, which remains a critical security risk in embedded network devices like routers.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to small and medium enterprises (SMEs) and home users relying on Totolink N200RE routers for network connectivity. Compromise of these routers can lead to interception of sensitive data, unauthorized network access, lateral movement within corporate networks, and disruption of internet services. Given the router’s role as a network gateway, attackers could manipulate DNS settings to redirect traffic to malicious sites, conduct man-in-the-middle attacks, or deploy malware payloads. The lack of vendor response and patches increases the window of exposure. Critical infrastructure or organizations with remote offices using this router model are particularly vulnerable. Additionally, the requirement for authentication to exploit the vulnerability suggests that attackers may first need to compromise credentials or gain local network access, but once achieved, the impact is severe. The vulnerability could also be leveraged in targeted attacks against European entities, especially where Totolink devices are prevalent.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately audit their networks to identify the presence of Totolink N200RE routers running the vulnerable firmware version. Network administrators should restrict access to the router management interface by limiting it to trusted IP addresses and disabling remote management if enabled. Strong, unique administrative credentials must be enforced to prevent unauthorized authentication. Network segmentation should be applied to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts. Where possible, organizations should consider replacing affected devices with routers from vendors with active security support. Additionally, applying web application firewalls or intrusion prevention systems that can detect and block malformed HTTP requests targeting /cgi-bin/cstecgi.cgi may reduce risk. Finally, organizations should maintain awareness of any future patches or advisories from Totolink or security communities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-29T06:56:59.699Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316ec
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:43:28 PM
Last updated: 8/1/2025, 3:13:13 AM
Views: 13
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.