CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8573

Critical Severity
Totolink
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.00254/1

CVE-2024-8573 is a critical vulnerability in TOTOLINK AC1200 T8 and AC1200 T10 routers that could allow remote attackers to execute arbitrary code. Specifically, a buffer overflow exists in the setParentalRules function within the /cgi-bin/cstecgi.cgi file. This vulnerability is triggered by manipulating the desc, week, sTime, or eTime arguments. With a SOCRadar Vulnerability Risk Score (SVRS) of 77, this CVE approaches the threshold for a critical vulnerability requiring immediate attention. Although not exceeding the critical SVRS threshold of 80, the high score, combined with a CVSS score of 8.8, indicates a serious security risk. The public availability of an exploit further elevates the urgency to apply patches. The lack of vendor response to the disclosure emphasizes the need for users to implement alternative mitigation strategies until a fix is available to protect against potential exploitation.

Technical-description
Signature
Permissions-required
Third-party-advisory
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2025-03-03

2024-09-08
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8573 is a critical vulnerability in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207 routers. It allows remote attackers to execute arbitrary code by manipulating the desc argument in the setParentalRules function of the /cgi-bin/cstecgi.cgi file, leading to a buffer overflow. The SVRS of 86 indicates a high level of urgency and severity.

Key Insights

  • Remote Exploitation: Attackers can exploit this vulnerability remotely, increasing the risk of widespread attacks.
  • Public Disclosure: The exploit has been publicly disclosed, making it more likely that attackers will attempt to exploit it.
  • Vendor Inactivity: The vendor has not responded to the disclosure, leaving users vulnerable until a patch is released.

Mitigation Strategies

  • Apply Patches: Install security patches from the vendor as soon as they become available.
  • Disable Remote Access: Disable remote access to the router's management interface if possible.
  • Use Strong Passwords: Use strong and unique passwords for the router's administrative account.
  • Monitor Network Traffic: Monitor network traffic for suspicious activity and block any unauthorized access attempts.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
  • In the Wild: The vulnerability is actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-8573 | TOTOLINK AC1200 T8/AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207 /cgi-bin/cstecgi.cgi setParentalRules desc/week/sTime/eTime buffer overflow
vuldb.com2025-03-03
CVE-2024-8573 | TOTOLINK AC1200 T8/AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207 /cgi-bin/cstecgi.cgi setParentalRules desc/week/sTime/eTime buffer overflow | A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc/week/sTime/eTime leads to buffer overflow. This vulnerability is uniquely identified as <a href="https://vuldb.com
vuldb.com
rss
forum
news

Social Media

CVE-2024-8573 A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParen… https://t.co/pfYZfVkmtY
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSTotolinkt8_firmware
Configuration 2
TypeVendorProduct
OSTotolinkt10_firmware

References

ReferenceLink
[email protected]https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setParentalRules.md
[email protected]https://vuldb.com/?ctiid.276807
[email protected]https://vuldb.com/?id.276807
[email protected]https://vuldb.com/?submit.401262
[email protected]https://www.totolink.net/
SUBMIT #401262 | TOTOLINK AC1200 T8 V4.1.5CU.861_B20230220 BUFFER OVERFLOWhttps://vuldb.com/?submit.401262
VDB-276807 | CTI INDICATORS (IOB, IOC, IOA)https://vuldb.com/?ctiid.276807
VDB-276807 | TOTOLINK AC1200 T8/AC1200 T10 CSTECGI.CGI SETPARENTALRULES BUFFER OVERFLOWhttps://vuldb.com/?id.276807
GITHUBhttps://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setParentalRules.md

CWE Details

CWE IDCWE NameDescription
CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
CWE-119Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence