Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32326: n/a

0
Medium
VulnerabilityCVE-2024-32326cvecve-2024-32326
Published: Thu Apr 18 2024 (04/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32326 is a Cross-site Scripting (XSS) vulnerability found in TOTOLINK EX200 firmware version 4. 0. 3c. 7646_B20201211. The vulnerability exists in the setWiFiExtenderConfig function, specifically through the 'key' parameter. Exploitation requires low attack complexity but does require privileges and user interaction. The vulnerability allows an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to theft of sensitive information or session hijacking. There are no known exploits in the wild currently, and no official patch has been released yet. The CVSS v3. 1 base score is 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:17:39 UTC

Technical Analysis

CVE-2024-32326 is a Cross-site Scripting (XSS) vulnerability identified in the TOTOLINK EX200 WiFi extender running firmware version 4.0.3c.7646_B20201211. The flaw resides in the setWiFiExtenderConfig function, where the 'key' parameter is improperly sanitized, allowing injection of malicious scripts. When an authenticated user interacts with the vulnerable interface, an attacker can craft a specially crafted request that injects JavaScript code. This code executes in the context of the victim’s browser session, potentially exposing sensitive information such as cookies, session tokens, or enabling actions on behalf of the user. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), but the attack complexity is low (AC:L), and the vulnerability can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, increasing its impact. The CVSS score of 6.8 reflects a medium severity, primarily due to the high confidentiality impact but no direct impact on integrity or availability. No public exploits or patches are currently available, so organizations must rely on mitigation strategies until a fix is released. This vulnerability falls under CWE-79, a common web security weakness related to improper input validation leading to XSS.

Potential Impact

The primary impact of CVE-2024-32326 is on the confidentiality of users interacting with the TOTOLINK EX200 device’s management interface. Successful exploitation can lead to theft of session cookies or other sensitive data, enabling attackers to hijack user sessions or perform unauthorized actions within the device’s web interface. While the vulnerability does not directly affect system integrity or availability, the compromise of administrative sessions could lead to further unauthorized configuration changes or network compromise. Organizations deploying TOTOLINK EX200 extenders in enterprise or sensitive environments risk exposure of internal network configurations or credentials. The requirement for user interaction and privileges somewhat limits the attack surface but does not eliminate risk, especially in environments with multiple users or less stringent access controls. The lack of known exploits in the wild reduces immediate risk but does not preclude future exploitation. Overall, the vulnerability poses a moderate threat to network security and user privacy.

Mitigation Recommendations

To mitigate CVE-2024-32326, organizations should first restrict access to the TOTOLINK EX200 management interface to trusted networks and users only, minimizing exposure to potential attackers. Implement network segmentation and firewall rules to limit remote access to the device’s web interface. Employ strong authentication mechanisms and ensure users have the minimum necessary privileges to reduce the risk of exploitation. Monitor network traffic and logs for unusual activity that could indicate attempted exploitation. Since no official patch is currently available, consider disabling the vulnerable setWiFiExtenderConfig functionality if possible or replacing the device with a more secure alternative. Educate users about the risks of interacting with suspicious links or inputs that could trigger XSS attacks. Regularly check for firmware updates from TOTOLINK and apply patches promptly once released. Additionally, use web application firewalls (WAFs) that can detect and block XSS payloads targeting the device’s interface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c35b7ef31ef0b56121f

Added to database: 2/25/2026, 9:40:05 PM

Last enriched: 2/26/2026, 4:17:39 AM

Last updated: 2/26/2026, 11:07:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats