CVE-2024-32334: n/a
CVE-2024-32334 is a stored Cross-site Scripting (XSS) vulnerability found in the TOTOLINK N300RT router firmware version V2. 1. 8-B20201030. 1539, specifically in the IP/Port Filtering feature under the Firewall page. This vulnerability allows an authenticated user with low privileges to inject malicious scripts that are stored and executed in the context of the router's web interface. Exploitation requires user interaction and privileges but can lead to a scope change affecting confidentiality, integrity, and availability of the device. The CVSS score is 6. 5 (medium severity), reflecting the moderate risk due to the need for authentication and user interaction. No known public exploits or patches are currently available. Organizations using this router model should be cautious and implement mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-32334 is a stored Cross-site Scripting (XSS) vulnerability identified in the TOTOLINK N300RT router firmware version V2.1.8-B20201030.1539. The vulnerability resides in the IP/Port Filtering functionality within the Firewall configuration page of the router's web management interface. Stored XSS occurs when malicious scripts injected by an attacker are saved by the application and later executed in the browser of users who access the affected page. In this case, an attacker with low-level privileges who can access the router's web interface can inject malicious JavaScript code into the IP/Port filtering settings. When a user (potentially an administrator or other authenticated user) views the affected page, the malicious script executes in their browser context. This can lead to session hijacking, unauthorized actions within the router interface, or further exploitation such as pivoting into the internal network. The vulnerability requires authentication (low privileges) and user interaction (visiting the page) to be exploited. The CVSS 3.1 vector indicates network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability (all low). No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential misuse.
Potential Impact
The impact of CVE-2024-32334 on organizations using the TOTOLINK N300RT router can be significant despite the medium severity rating. Successful exploitation can allow an attacker with low privileges to execute arbitrary scripts in the context of the router's web interface, potentially leading to session hijacking, unauthorized configuration changes, or further compromise of the internal network. This can degrade the confidentiality, integrity, and availability of network infrastructure managed by the affected routers. Since routers are critical network devices, compromise can facilitate lateral movement, data interception, or denial of service. Organizations relying on this router model, especially in small office/home office (SOHO) environments or branch offices, may face increased risk of targeted attacks or automated exploitation once public exploits emerge. The lack of available patches increases the window of exposure.
Mitigation Recommendations
1. Restrict access to the router's web management interface to trusted internal networks only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication policies and change default credentials to prevent unauthorized access. 3. Monitor router logs and network traffic for suspicious activities indicative of exploitation attempts. 4. Disable or limit the use of the IP/Port Filtering feature if not required, reducing the attack surface. 5. Regularly check for firmware updates from TOTOLINK and apply patches promptly once available. 6. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) that can detect and block XSS payloads targeting the router interface. 7. Educate users and administrators about the risks of interacting with untrusted content or links that may trigger exploitation. 8. If possible, isolate management interfaces on dedicated VLANs or out-of-band management networks to reduce exposure.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, South Korea, Japan
CVE-2024-32334: n/a
Description
CVE-2024-32334 is a stored Cross-site Scripting (XSS) vulnerability found in the TOTOLINK N300RT router firmware version V2. 1. 8-B20201030. 1539, specifically in the IP/Port Filtering feature under the Firewall page. This vulnerability allows an authenticated user with low privileges to inject malicious scripts that are stored and executed in the context of the router's web interface. Exploitation requires user interaction and privileges but can lead to a scope change affecting confidentiality, integrity, and availability of the device. The CVSS score is 6. 5 (medium severity), reflecting the moderate risk due to the need for authentication and user interaction. No known public exploits or patches are currently available. Organizations using this router model should be cautious and implement mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-32334 is a stored Cross-site Scripting (XSS) vulnerability identified in the TOTOLINK N300RT router firmware version V2.1.8-B20201030.1539. The vulnerability resides in the IP/Port Filtering functionality within the Firewall configuration page of the router's web management interface. Stored XSS occurs when malicious scripts injected by an attacker are saved by the application and later executed in the browser of users who access the affected page. In this case, an attacker with low-level privileges who can access the router's web interface can inject malicious JavaScript code into the IP/Port filtering settings. When a user (potentially an administrator or other authenticated user) views the affected page, the malicious script executes in their browser context. This can lead to session hijacking, unauthorized actions within the router interface, or further exploitation such as pivoting into the internal network. The vulnerability requires authentication (low privileges) and user interaction (visiting the page) to be exploited. The CVSS 3.1 vector indicates network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability (all low). No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential misuse.
Potential Impact
The impact of CVE-2024-32334 on organizations using the TOTOLINK N300RT router can be significant despite the medium severity rating. Successful exploitation can allow an attacker with low privileges to execute arbitrary scripts in the context of the router's web interface, potentially leading to session hijacking, unauthorized configuration changes, or further compromise of the internal network. This can degrade the confidentiality, integrity, and availability of network infrastructure managed by the affected routers. Since routers are critical network devices, compromise can facilitate lateral movement, data interception, or denial of service. Organizations relying on this router model, especially in small office/home office (SOHO) environments or branch offices, may face increased risk of targeted attacks or automated exploitation once public exploits emerge. The lack of available patches increases the window of exposure.
Mitigation Recommendations
1. Restrict access to the router's web management interface to trusted internal networks only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication policies and change default credentials to prevent unauthorized access. 3. Monitor router logs and network traffic for suspicious activities indicative of exploitation attempts. 4. Disable or limit the use of the IP/Port Filtering feature if not required, reducing the attack surface. 5. Regularly check for firmware updates from TOTOLINK and apply patches promptly once available. 6. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) that can detect and block XSS payloads targeting the router interface. 7. Educate users and administrators about the risks of interacting with untrusted content or links that may trigger exploitation. 8. If possible, isolate management interfaces on dedicated VLANs or out-of-band management networks to reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-12T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c35b7ef31ef0b56122f
Added to database: 2/25/2026, 9:40:05 PM
Last enriched: 2/26/2026, 4:18:26 AM
Last updated: 2/26/2026, 11:09:04 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.