Skip to main content

CVE-2024-24327: n/a in n/a

Critical
VulnerabilityCVE-2024-24327cvecve-2024-24327
Published: Tue Jan 30 2024 (01/30/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:56:57 UTC

Technical Analysis

CVE-2024-24327 is a critical command injection vulnerability identified in the TOTOLINK A3300R router firmware version V17.0.0cu.557_B20221024. The vulnerability exists in the setIpv6Cfg function, specifically via the pppoePass parameter. Command injection vulnerabilities (CWE-78) allow an attacker to execute arbitrary commands on the underlying operating system with the privileges of the affected application. In this case, the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible for attackers. The CVSS v3.1 base score of 9.8 reflects the severity, indicating that exploitation could lead to full system compromise with complete confidentiality, integrity, and availability impacts. The vulnerability affects the router's IPv6 configuration interface, which is typically accessible via the device's web management interface or network services. Exploiting this flaw could allow an attacker to execute arbitrary system commands, potentially leading to unauthorized control over the device, interception or manipulation of network traffic, or pivoting attacks into the internal network. No patches or fixes have been published yet, and there are no known exploits in the wild at this time. However, given the critical nature and ease of exploitation, this vulnerability poses a significant risk to users of the affected TOTOLINK router firmware version.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises or home offices relying on TOTOLINK A3300R routers for their network connectivity. Successful exploitation could lead to full compromise of the router, enabling attackers to intercept sensitive data, disrupt network availability, or use the device as a foothold for further attacks within the corporate network. This could result in data breaches, loss of intellectual property, or operational downtime. Additionally, compromised routers can be enlisted into botnets, contributing to broader cybercrime activities. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in environments where the affected device is exposed to untrusted networks or the internet. European organizations with remote or hybrid work setups may be especially vulnerable if these routers are deployed in home offices without adequate network segmentation or monitoring.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate steps to mitigate risk. First, isolate affected TOTOLINK A3300R routers from untrusted networks, especially the internet, by disabling remote management interfaces or restricting access via firewall rules. Network segmentation should be enforced to limit the router's access to critical internal resources. Monitoring network traffic for unusual activity or command injection attempts targeting the pppoePass parameter can help detect exploitation attempts. Organizations should consider replacing or upgrading affected devices to models with updated firmware once patches become available. Additionally, disabling IPv6 configuration features or services related to the setIpv6Cfg function, if possible, can reduce the attack surface. Regularly reviewing device firmware versions and subscribing to vendor security advisories will ensure timely application of future patches. Employing network intrusion detection/prevention systems (IDS/IPS) with signatures for command injection attempts can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c8182aa0cae28296cb

Added to database: 5/29/2025, 3:14:16 PM

Last enriched: 7/8/2025, 1:56:57 AM

Last updated: 7/31/2025, 4:28:53 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats