Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51141: n/a

0
High
VulnerabilityCVE-2024-51141cvecve-2024-51141
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in TOTOLINK Bluetooth Wireless Adapter A600UB allows a local attacker to execute arbitrary code via the WifiAutoInstallDriver.exe and MSASN1.dll components.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:47:29 UTC

Technical Analysis

CVE-2024-51141 is a vulnerability identified in the TOTOLINK Bluetooth Wireless Adapter A600UB, specifically involving the WifiAutoInstallDriver.exe and MSASN1.dll components. This flaw allows a local attacker to execute arbitrary code on the affected system. The attack vector is local, meaning the attacker must have physical or logical local access to the machine. The vulnerability does not require privileges or authentication but does require user interaction, such as running or triggering the vulnerable components. The CVSS 3.1 base score is 7.8, reflecting high severity due to the potential for full compromise of confidentiality, integrity, and availability of the system. The vulnerability is classified under CWE-354, which typically relates to improper resource control or race conditions that can be exploited to execute code. No specific affected versions are listed, indicating the issue may affect all versions of the device or software components. No patches or fixes have been published yet, and there are no known exploits in the wild. The components involved are part of the driver installation and ASN.1 parsing, which are critical for device operation and security. Exploitation could lead to system compromise, data theft, or disruption of services.

Potential Impact

The impact of CVE-2024-51141 is significant for organizations using the TOTOLINK Bluetooth Wireless Adapter A600UB. Successful exploitation allows an attacker with local access to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized data access, modification, or destruction, as well as disruption of device functionality. Since the vulnerability affects driver and DLL components, it could undermine the security of the host system and any connected networks. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where attackers can gain physical or logical local access, such as shared workstations, public kiosks, or compromised user accounts. The absence of patches increases the window of exposure. Organizations relying on this hardware for wireless connectivity may face increased risk of targeted attacks, insider threats, or lateral movement within networks.

Mitigation Recommendations

To mitigate CVE-2024-51141, organizations should first restrict local access to systems using the TOTOLINK A600UB adapter, ensuring only trusted users can interact with these devices. Disable or uninstall the vulnerable WifiAutoInstallDriver.exe and related components if possible, or replace the adapter with a non-vulnerable alternative until patches are available. Monitor systems for unusual activity related to driver installation or DLL loading, and employ endpoint detection and response (EDR) tools to detect exploitation attempts. Educate users about the risks of interacting with unknown or untrusted software prompts, as user interaction is required for exploitation. Network segmentation can limit the impact of a compromised device. Regularly check for vendor updates or security advisories to apply patches promptly once released. Additionally, consider application whitelisting to prevent unauthorized execution of vulnerable components. Conduct thorough audits of devices and drivers in use to identify and remediate vulnerable hardware.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6baab7ef31ef0b557acb

Added to database: 2/25/2026, 9:37:46 PM

Last enriched: 2/28/2026, 2:47:29 AM

Last updated: 4/12/2026, 6:14:20 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses