Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42747: n/a

0
High
VulnerabilityCVE-2024-42747cvecve-2024-42747
Published: Mon Aug 12 2024 (08/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setWanIeCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:11:49 UTC

Technical Analysis

CVE-2024-42747 is a high-severity OS command injection vulnerability identified in the TOTOLINK X5000r router firmware version 9.1.0cu.2350_b20230313. The vulnerability resides in the CGI script /cgi-bin/cstecgi.cgi, specifically within the setWanIeCfg function. This function improperly sanitizes user input, allowing an authenticated attacker to inject arbitrary OS commands via specially crafted packets. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Successful exploitation requires the attacker to have valid credentials and perform user interaction, such as sending malicious requests to the router's web management interface. Once exploited, the attacker can execute arbitrary commands with the privileges of the web server process, potentially leading to full device compromise, including data theft, configuration manipulation, or denial of service. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The CVSS v3.1 base score is 7.3, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring privileges and user interaction. This vulnerability highlights the risks of insufficient input validation in embedded device web interfaces and underscores the need for secure coding practices in IoT and networking equipment firmware.

Potential Impact

The impact of CVE-2024-42747 is significant for organizations using TOTOLINK X5000r routers. An attacker with valid credentials can execute arbitrary OS commands, potentially gaining full control over the device. This can lead to unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and use of the compromised router as a foothold for lateral movement within the network. The confidentiality of sensitive information passing through the router can be compromised, integrity of configurations and firmware can be altered, and availability of network connectivity can be disrupted. Given that routers are critical network infrastructure components, exploitation could affect business continuity and expose organizations to further attacks such as malware deployment or data exfiltration. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with weak or default credentials or where attackers have gained initial access. The absence of patches increases the window of exposure, making timely mitigation essential.

Mitigation Recommendations

To mitigate CVE-2024-42747, organizations should first verify if they are using the affected TOTOLINK X5000r firmware version 9.1.0cu.2350_b20230313. Since no official patch is currently available, immediate steps include restricting access to the router's web management interface to trusted networks only, preferably via VPN or secure management VLANs. Enforce strong, unique passwords and disable any default or unused accounts to reduce the risk of credential compromise. Implement network segmentation to isolate critical devices and limit the impact of a compromised router. Monitor router logs and network traffic for unusual or unauthorized command execution attempts targeting /cgi-bin/cstecgi.cgi. Consider deploying intrusion detection/prevention systems with signatures for suspicious CGI requests. If possible, replace affected devices with models from vendors that provide timely security updates. Stay informed about vendor advisories for forthcoming patches and apply them promptly once released. Additionally, conduct regular security assessments of network infrastructure to identify and remediate similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ccab7ef31ef0b569132

Added to database: 2/25/2026, 9:42:34 PM

Last enriched: 2/28/2026, 6:11:49 AM

Last updated: 4/12/2026, 6:10:05 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses