Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54907: n/a

0
High
VulnerabilityCVE-2024-54907cvecve-2024-54907
Published: Thu Dec 26 2024 (12/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-54907 is a high-severity remote code execution vulnerability affecting TOTOLINK A3002R routers running firmware version 4. 0. 0-B20230531. 1404. The flaw exists in the /bin/boa component via the formWsc interface, allowing an attacker with low privileges to execute arbitrary code remotely without user interaction. The vulnerability is classified under CWE-94, indicating improper control of code generation. Exploitation requires network access but no user authentication is needed beyond low privileges. While no known exploits are currently observed in the wild, the vulnerability poses significant risks to confidentiality, integrity, and availability of affected devices. Organizations using these routers should prioritize patching or mitigating this issue promptly to prevent potential compromise. Countries with widespread use of TOTOLINK devices and strategic reliance on such network infrastructure are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:56:54 UTC

Technical Analysis

CVE-2024-54907 is a remote code execution (RCE) vulnerability identified in the TOTOLINK A3002R router firmware version 4.0.0-B20230531.1404. The vulnerability resides in the /bin/boa component, specifically exploitable via the formWsc interface. Boa is a lightweight web server often embedded in network devices for management purposes. The flaw is classified under CWE-94, which relates to improper control of code generation, suggesting that the vulnerability allows injection and execution of arbitrary code on the device. The CVSS v3.1 score of 8.8 indicates a high severity, with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H meaning the attack can be performed remotely over the network with low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability. The vulnerability allows an attacker to gain remote code execution capabilities, potentially leading to full device compromise, interception or manipulation of network traffic, and disruption of network services. No patches or fixes are currently linked, and no exploits have been reported in the wild yet, but the risk remains significant given the nature of the flaw and the critical role of routers in network infrastructure.

Potential Impact

The impact of CVE-2024-54907 is substantial for organizations relying on TOTOLINK A3002R routers. Successful exploitation can lead to full compromise of the router, allowing attackers to execute arbitrary commands with elevated privileges. This can result in interception and manipulation of sensitive network traffic, unauthorized access to internal networks, deployment of malware or ransomware, and disruption of network availability. The confidentiality, integrity, and availability of organizational data and services are at high risk. Given that routers serve as critical gateways, compromise can facilitate lateral movement within networks and persistent footholds for attackers. This threat is particularly concerning for enterprises, ISPs, and critical infrastructure providers using affected devices, as well as home users with sensitive data or IoT devices connected through these routers.

Mitigation Recommendations

To mitigate CVE-2024-54907, organizations should first verify if they are using the TOTOLINK A3002R router with the vulnerable firmware version 4.0.0-B20230531.1404. Immediate steps include: 1) Isolate affected devices from untrusted networks to limit exposure; 2) Disable or restrict access to the formWsc interface if possible, especially from external networks; 3) Implement network segmentation to reduce potential lateral movement if a device is compromised; 4) Monitor network traffic for unusual activity indicative of exploitation attempts; 5) Apply any available firmware updates or patches from TOTOLINK as soon as they are released; 6) If patches are not yet available, consider replacing vulnerable devices with models not affected by this vulnerability; 7) Employ intrusion detection/prevention systems with signatures targeting this vulnerability once available; 8) Enforce strong network access controls and limit administrative access to trusted personnel and networks only. These targeted actions go beyond generic advice by focusing on the specific vulnerable interface and device.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc8b7ef31ef0b55ae4e

Added to database: 2/25/2026, 9:38:16 PM

Last enriched: 2/26/2026, 1:56:54 AM

Last updated: 2/26/2026, 6:14:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats