CVE-2024-0998: CWE-121 Stack-based Buffer Overflow in Totolink N200RE
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0998 is a critical stack-based buffer overflow vulnerability identified in the Totolink N200RE router, specifically in firmware version 9.3.5u.6139_B20201216. The vulnerability exists in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the 'ip' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. Because the vulnerability is remotely exploitable without user interaction, an attacker can send specially crafted HTTP requests to the affected device to trigger the overflow. The overflow can lead to arbitrary code execution with elevated privileges, potentially allowing full compromise of the router. The CVSS 3.1 base score is 7.2 (high severity), reflecting the network attack vector, low attack complexity, but requiring high privileges (authentication) to exploit. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could manipulate router configurations, intercept or redirect traffic, or cause denial of service. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no exploits are currently known in the wild, public disclosure of the exploit code increases the risk of active exploitation. This vulnerability is a classic example of CWE-121, a stack-based buffer overflow, which remains a critical security risk in embedded network devices like routers.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to small and medium enterprises (SMEs) and home users relying on Totolink N200RE routers for network connectivity. Compromise of these routers can lead to interception of sensitive data, unauthorized network access, lateral movement within corporate networks, and disruption of internet services. Given the router’s role as a network gateway, attackers could manipulate DNS settings to redirect traffic to malicious sites, conduct man-in-the-middle attacks, or deploy malware payloads. The lack of vendor response and patches increases the window of exposure. Critical infrastructure or organizations with remote offices using this router model are particularly vulnerable. Additionally, the requirement for authentication to exploit the vulnerability suggests that attackers may first need to compromise credentials or gain local network access, but once achieved, the impact is severe. The vulnerability could also be leveraged in targeted attacks against European entities, especially where Totolink devices are prevalent.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately audit their networks to identify the presence of Totolink N200RE routers running the vulnerable firmware version. Network administrators should restrict access to the router management interface by limiting it to trusted IP addresses and disabling remote management if enabled. Strong, unique administrative credentials must be enforced to prevent unauthorized authentication. Network segmentation should be applied to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts. Where possible, organizations should consider replacing affected devices with routers from vendors with active security support. Additionally, applying web application firewalls or intrusion prevention systems that can detect and block malformed HTTP requests targeting /cgi-bin/cstecgi.cgi may reduce risk. Finally, organizations should maintain awareness of any future patches or advisories from Totolink or security communities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0998: CWE-121 Stack-based Buffer Overflow in Totolink N200RE
Description
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0998 is a critical stack-based buffer overflow vulnerability identified in the Totolink N200RE router, specifically in firmware version 9.3.5u.6139_B20201216. The vulnerability exists in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi file. This function improperly handles the 'ip' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. Because the vulnerability is remotely exploitable without user interaction, an attacker can send specially crafted HTTP requests to the affected device to trigger the overflow. The overflow can lead to arbitrary code execution with elevated privileges, potentially allowing full compromise of the router. The CVSS 3.1 base score is 7.2 (high severity), reflecting the network attack vector, low attack complexity, but requiring high privileges (authentication) to exploit. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could manipulate router configurations, intercept or redirect traffic, or cause denial of service. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no exploits are currently known in the wild, public disclosure of the exploit code increases the risk of active exploitation. This vulnerability is a classic example of CWE-121, a stack-based buffer overflow, which remains a critical security risk in embedded network devices like routers.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to small and medium enterprises (SMEs) and home users relying on Totolink N200RE routers for network connectivity. Compromise of these routers can lead to interception of sensitive data, unauthorized network access, lateral movement within corporate networks, and disruption of internet services. Given the router’s role as a network gateway, attackers could manipulate DNS settings to redirect traffic to malicious sites, conduct man-in-the-middle attacks, or deploy malware payloads. The lack of vendor response and patches increases the window of exposure. Critical infrastructure or organizations with remote offices using this router model are particularly vulnerable. Additionally, the requirement for authentication to exploit the vulnerability suggests that attackers may first need to compromise credentials or gain local network access, but once achieved, the impact is severe. The vulnerability could also be leveraged in targeted attacks against European entities, especially where Totolink devices are prevalent.
Mitigation Recommendations
Since no official patch is available, European organizations should immediately audit their networks to identify the presence of Totolink N200RE routers running the vulnerable firmware version. Network administrators should restrict access to the router management interface by limiting it to trusted IP addresses and disabling remote management if enabled. Strong, unique administrative credentials must be enforced to prevent unauthorized authentication. Network segmentation should be applied to isolate vulnerable devices from critical systems. Monitoring network traffic for unusual patterns or unauthorized configuration changes can help detect exploitation attempts. Where possible, organizations should consider replacing affected devices with routers from vendors with active security support. Additionally, applying web application firewalls or intrusion prevention systems that can detect and block malformed HTTP requests targeting /cgi-bin/cstecgi.cgi may reduce risk. Finally, organizations should maintain awareness of any future patches or advisories from Totolink or security communities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-29T06:56:59.699Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316ec
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:43:28 PM
Last updated: 12/1/2025, 10:30:14 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41739: CWE-125 Out-of-bounds Read in CODESYS CODESYS PLCHandler
MediumCVE-2025-41738: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in CODESYS CODESYS Control RTE (SL)
HighCVE-2025-41700: CWE-502 Deserialization of Untrusted Data in CODESYS CODESYS Development System
HighCVE-2025-13819: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in MiR Robot
MediumCVE-2025-13816: Path Traversal in moxi159753 Mogu Blog v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.