Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57023: n/a

0
Medium
VulnerabilityCVE-2024-57023cvecve-2024-57023
Published: Wed Jan 15 2025 (01/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "week" parameter in setWiFiScheduleCfg.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:01:39 UTC

Technical Analysis

CVE-2024-57023 is an operating system command injection vulnerability identified in the TOTOLINK X5000R router firmware version V9.1.0cu.2350_B20230313. The vulnerability arises from improper input validation in the 'week' parameter of the setWiFiScheduleCfg function, which is responsible for configuring WiFi scheduling on the device. An attacker with authenticated high-level privileges can inject arbitrary OS commands through this parameter, leading to execution of malicious commands on the underlying system. This can compromise the router’s operating system, potentially allowing attackers to manipulate device configurations, disrupt network services, or gain persistent unauthorized access. The CVSS v3.1 base score of 6.8 reflects medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability represents a significant risk due to the critical role routers play in network infrastructure. The CWE-78 classification confirms this is a classic OS command injection flaw. The lack of available patches at the time of publication necessitates immediate risk mitigation through access restrictions and monitoring.

Potential Impact

The exploitation of CVE-2024-57023 could have severe consequences for organizations relying on TOTOLINK X5000R routers. Successful command injection can lead to full compromise of the router, allowing attackers to alter network configurations, intercept or redirect traffic, and potentially pivot to internal networks. This threatens confidentiality by exposing sensitive data, integrity by modifying configurations or firmware, and availability by disrupting network connectivity. Given the router’s role as a network gateway, such compromise can facilitate broader attacks on organizational infrastructure. The requirement for authenticated high privileges limits exploitation to insiders or attackers who have already breached initial defenses, but the low complexity and lack of user interaction make it easier to execute once access is obtained. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits rapidly once the vulnerability is public. Organizations with large deployments of affected devices face increased risk of widespread disruption and data breaches.

Mitigation Recommendations

To mitigate CVE-2024-57023, organizations should immediately restrict administrative access to TOTOLINK X5000R routers, ensuring only trusted personnel can authenticate with high privileges. Network segmentation should be employed to isolate management interfaces from general user networks and the internet. Monitoring and logging of WiFi scheduling configuration changes should be enabled to detect anomalous activity indicative of exploitation attempts. Until an official patch is released, consider disabling WiFi scheduling features if feasible to reduce attack surface. Employ strong authentication mechanisms, such as multi-factor authentication, for router management access. Regularly audit device firmware versions and subscribe to vendor advisories to apply patches promptly once available. Additionally, implement network intrusion detection systems capable of identifying command injection patterns or unusual command executions on network devices. Conduct security awareness training for administrators to recognize and report suspicious router behavior.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd4b7ef31ef0b55b494

Added to database: 2/25/2026, 9:38:28 PM

Last enriched: 2/28/2026, 12:01:39 AM

Last updated: 4/12/2026, 2:05:59 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses