Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28402: n/a

0
Medium
VulnerabilityCVE-2024-28402cvecve-2024-28402
Published: Thu Mar 21 2024 (03/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X2000R before V1.0.0-B20231213.1013 contains a Stored Cross-site scripting (XSS) vulnerability in IP/Port Filtering under the Firewall Page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:20:05 UTC

Technical Analysis

CVE-2024-28402 identifies a stored cross-site scripting (XSS) vulnerability in the TOTOLINK X2000R wireless router firmware versions prior to V1.0.0-B20231213.1013. The vulnerability resides specifically in the IP/Port Filtering functionality located on the Firewall configuration page of the router's web-based management interface. Stored XSS means that malicious input submitted by an attacker is permanently saved by the device and later rendered in the web interface without proper sanitization or encoding. An attacker with low-level privileges and authenticated access to the router’s management interface can inject malicious JavaScript code into the IP/Port Filtering fields. When an authorized user views this page, the injected script executes in their browser context, potentially allowing session hijacking, credential theft, or further administrative actions on the router. The CVSS v3.1 vector (AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) indicates that the attack requires network access with low complexity, low privileges, and user interaction, but the scope is changed, meaning the vulnerability affects resources beyond the initially compromised component. The impact includes partial loss of confidentiality, integrity, and availability of the router’s management functions. While no public exploits or patches are currently available, the vulnerability poses a moderate risk, especially in environments where multiple users have access to router management or where the router is exposed to semi-trusted networks.

Potential Impact

The vulnerability could allow an authenticated attacker with low privileges to execute arbitrary scripts within the router’s management interface, potentially leading to session hijacking, unauthorized configuration changes, or further compromise of the device. This can degrade the confidentiality and integrity of network management and may disrupt availability if malicious scripts alter firewall or routing rules. Organizations relying on TOTOLINK X2000R routers, especially in multi-user or semi-public environments, face risks of unauthorized access escalation and network compromise. The impact is amplified in scenarios where the router’s management interface is accessible over less secure networks or where administrative credentials are shared or weak. Although exploitation requires authentication and user interaction, the stored nature of the XSS means that multiple users could be affected once the malicious payload is injected. This could facilitate lateral movement or persistent footholds within the network infrastructure.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface to trusted networks and users only, preferably via VPN or isolated management VLANs. 2. Enforce strong authentication policies, including unique, complex passwords and, if supported, multi-factor authentication for router access. 3. Monitor and audit user activity on the router management interface to detect suspicious input or configuration changes. 4. Avoid sharing management credentials among multiple users to limit exposure. 5. Regularly check for firmware updates from TOTOLINK and apply patches promptly once available to remediate this vulnerability. 6. As a temporary workaround, avoid using the IP/Port Filtering feature until a fix is released or sanitize inputs manually if possible. 7. Educate users with access to the router interface about the risks of clicking unknown links or executing untrusted scripts. 8. Consider network segmentation to isolate critical infrastructure from devices with known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8fb7ef31ef0b588937

Added to database: 2/25/2026, 9:45:51 PM

Last enriched: 2/28/2026, 10:20:05 AM

Last updated: 4/12/2026, 4:19:37 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses