Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31813: n/a

0
High
VulnerabilityCVE-2024-31813cvecve-2024-31813
Published: Mon Apr 08 2024 (04/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:30:08 UTC

Technical Analysis

CVE-2024-31813 identifies a critical security vulnerability in the TOTOLINK EX200 router firmware version 4.0.3c.7646_B20201211, where the device does not implement any authentication mechanism by default (CWE-862: Missing Authentication). This means that anyone with network access to the device can access its management interface and perform administrative actions without needing credentials or user interaction. The vulnerability is rated with a CVSS 3.1 score of 8.4 (high severity), with an attack vector limited to local network (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as an attacker can fully control the device, intercept or modify network traffic, and disrupt network services. Although no public exploits have been reported yet, the lack of authentication presents a significant risk, especially in environments where the device is exposed to untrusted local networks or where network segmentation is weak. The absence of patch links suggests that no official fix has been released at the time of publication, so mitigation relies on configuration changes or network controls. This vulnerability highlights the critical importance of default authentication mechanisms in network devices to prevent unauthorized access and control.

Potential Impact

The vulnerability allows unauthenticated attackers on the local network to gain full administrative access to the TOTOLINK EX200 router. This can lead to severe consequences including interception and manipulation of network traffic, unauthorized configuration changes, deployment of malicious firmware or scripts, and denial of service by disrupting router functionality. Organizations relying on this device may experience data breaches, network outages, and compromise of connected systems. The high impact on confidentiality, integrity, and availability means that sensitive information could be exposed or altered, and network reliability could be severely degraded. The scope is limited to local network access, but in environments with weak network segmentation or exposed Wi-Fi, the risk expands significantly. The lack of authentication also increases the likelihood of insider threats or attacks from compromised devices within the network.

Mitigation Recommendations

Since no official patch is currently available, organizations should immediately implement network-level mitigations. These include isolating the affected routers on separate VLANs or network segments inaccessible to untrusted users and devices, disabling remote management interfaces, and restricting physical and wireless access to trusted personnel only. Administrators should check for any undocumented or hidden authentication settings and enable them if possible. Monitoring network traffic for unusual activity targeting the router’s management interface is critical. If possible, replace the affected device with a model that enforces authentication by default or apply firmware updates once released by TOTOLINK. Additionally, enforce strong network segmentation and implement intrusion detection systems to detect attempts to exploit this vulnerability. Document and audit all router configurations regularly to detect unauthorized changes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd8b7ef31ef0b58f733

Added to database: 2/25/2026, 9:47:04 PM

Last enriched: 2/26/2026, 12:30:08 PM

Last updated: 4/12/2026, 9:24:08 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses