CVE-2024-31805: n/a
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function.
AI Analysis
Technical Summary
CVE-2024-31805 is a vulnerability identified in the TOTOLINK EX200 router firmware version 4.0.3c.7646_B20201211. The flaw resides in the setTelnetCfg function, which controls the Telnet service configuration. Attackers can exploit this vulnerability by sending crafted requests that manipulate the telnet_enabled parameter, enabling the Telnet service without any authentication. Telnet is an insecure protocol that transmits data in plaintext, making it a significant security risk if enabled unintentionally. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the device fails to enforce proper authorization checks before allowing Telnet activation. The CVSS v3.1 base score is 6.5, reflecting medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). This means an attacker on the same or adjacent network segment can remotely enable Telnet, potentially gaining unauthorized access to the device or network traffic. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a clear risk due to the ease of exploitation and the sensitive nature of Telnet access.
Potential Impact
The primary impact of this vulnerability is unauthorized activation of the Telnet service on affected TOTOLINK EX200 routers, which can lead to significant confidentiality risks. Once Telnet is enabled, attackers can attempt to connect remotely and potentially intercept or manipulate network traffic, access device configuration, or launch further attacks within the network. This exposure can compromise sensitive information and network integrity. Since Telnet transmits data unencrypted, credentials and other sensitive data could be intercepted by attackers. The vulnerability does not affect integrity or availability directly but opens a pathway for further exploitation. Organizations relying on these routers, especially in environments with sensitive data or critical infrastructure, face increased risk of unauthorized access and data breaches. The lack of authentication requirement and no need for user interaction make this vulnerability easier to exploit, increasing the threat level in local or adjacent network environments.
Mitigation Recommendations
To mitigate CVE-2024-31805, organizations should immediately verify if their network uses TOTOLINK EX200 routers running the vulnerable firmware version 4.0.3c.7646_B20201211. If so, they should disable Telnet access entirely if it is not required, as Telnet is an outdated and insecure protocol. Network administrators should restrict access to router management interfaces to trusted IP addresses and consider segmenting management networks to limit exposure. Monitoring network traffic for unexpected Telnet activation attempts can help detect exploitation attempts. Since no official patches are currently available, organizations should contact TOTOLINK support for firmware updates or advisories. Applying network-level controls such as firewall rules to block Telnet ports (TCP 23) from untrusted sources is also recommended. Additionally, replacing Telnet with secure alternatives like SSH for remote management can reduce risk. Regularly auditing router configurations and firmware versions will help maintain security posture against similar vulnerabilities.
Affected Countries
China, India, Vietnam, Russia, Germany, France, United Kingdom, United States, Brazil, Indonesia
CVE-2024-31805: n/a
Description
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-31805 is a vulnerability identified in the TOTOLINK EX200 router firmware version 4.0.3c.7646_B20201211. The flaw resides in the setTelnetCfg function, which controls the Telnet service configuration. Attackers can exploit this vulnerability by sending crafted requests that manipulate the telnet_enabled parameter, enabling the Telnet service without any authentication. Telnet is an insecure protocol that transmits data in plaintext, making it a significant security risk if enabled unintentionally. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the device fails to enforce proper authorization checks before allowing Telnet activation. The CVSS v3.1 base score is 6.5, reflecting medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). This means an attacker on the same or adjacent network segment can remotely enable Telnet, potentially gaining unauthorized access to the device or network traffic. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a clear risk due to the ease of exploitation and the sensitive nature of Telnet access.
Potential Impact
The primary impact of this vulnerability is unauthorized activation of the Telnet service on affected TOTOLINK EX200 routers, which can lead to significant confidentiality risks. Once Telnet is enabled, attackers can attempt to connect remotely and potentially intercept or manipulate network traffic, access device configuration, or launch further attacks within the network. This exposure can compromise sensitive information and network integrity. Since Telnet transmits data unencrypted, credentials and other sensitive data could be intercepted by attackers. The vulnerability does not affect integrity or availability directly but opens a pathway for further exploitation. Organizations relying on these routers, especially in environments with sensitive data or critical infrastructure, face increased risk of unauthorized access and data breaches. The lack of authentication requirement and no need for user interaction make this vulnerability easier to exploit, increasing the threat level in local or adjacent network environments.
Mitigation Recommendations
To mitigate CVE-2024-31805, organizations should immediately verify if their network uses TOTOLINK EX200 routers running the vulnerable firmware version 4.0.3c.7646_B20201211. If so, they should disable Telnet access entirely if it is not required, as Telnet is an outdated and insecure protocol. Network administrators should restrict access to router management interfaces to trusted IP addresses and consider segmenting management networks to limit exposure. Monitoring network traffic for unexpected Telnet activation attempts can help detect exploitation attempts. Since no official patches are currently available, organizations should contact TOTOLINK support for firmware updates or advisories. Applying network-level controls such as firewall rules to block Telnet ports (TCP 23) from untrusted sources is also recommended. Additionally, replacing Telnet with secure alternatives like SSH for remote management can reduce risk. Regularly auditing router configurations and firmware versions will help maintain security posture against similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dd6b7ef31ef0b58f660
Added to database: 2/25/2026, 9:47:02 PM
Last enriched: 2/26/2026, 4:27:49 PM
Last updated: 4/12/2026, 3:38:54 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.