Totolink N200RE cstecgi.cgi setDiagnosisCfg stack-based overflow
CVE-2024-0998

8.8HIGH

Key Information:

Vendor
Totolink
Status
Vendor
CVE Published:
29 January 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability has been identified in the Totolink N200RE routers, specifically in the setDiagnosisCfg function found in the /cgi-bin/cstecgi.cgi file. This issue arises from improper handling of the 'ip' argument, which can lead to a stack-based buffer overflow. An attacker can exploit this vulnerability remotely, potentially compromising the security and functionality of the affected router. Despite prior notification to the vendor regarding this vulnerability, there has been no response, highlighting a critical need for users to take immediate protective measures, such as applying security patches or disabling affected features until a fix is available. Continued public disclosure about this vulnerability emphasizes the urgency for Totolink users to remain vigilant.

Affected Version(s)

N200RE 9.3.5u.6139_B20201216

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

jylsec (VulDB User)
.