CVE-2024-8573
Totolink
CVE-2024-8573 is a critical vulnerability in TOTOLINK AC1200 T8 and AC1200 T10 routers that could allow remote attackers to execute arbitrary code. Specifically, a buffer overflow exists in the setParentalRules function within the /cgi-bin/cstecgi.cgi file. This vulnerability is triggered by manipulating the desc, week, sTime, or eTime arguments. With a SOCRadar Vulnerability Risk Score (SVRS) of 77, this CVE approaches the threshold for a critical vulnerability requiring immediate attention. Although not exceeding the critical SVRS threshold of 80, the high score, combined with a CVSS score of 8.8, indicates a serious security risk. The public availability of an exploit further elevates the urgency to apply patches. The lack of vendor response to the disclosure emphasizes the need for users to implement alternative mitigation strategies until a fix is available to protect against potential exploitation.
Description
CVE-2024-8573 is a critical vulnerability in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207 routers. It allows remote attackers to execute arbitrary code by manipulating the desc argument in the setParentalRules function of the /cgi-bin/cstecgi.cgi file, leading to a buffer overflow. The SVRS of 86 indicates a high level of urgency and severity.
Key Insights
- Remote Exploitation: Attackers can exploit this vulnerability remotely, increasing the risk of widespread attacks.
- Public Disclosure: The exploit has been publicly disclosed, making it more likely that attackers will attempt to exploit it.
- Vendor Inactivity: The vendor has not responded to the disclosure, leaving users vulnerable until a patch is released.
Mitigation Strategies
- Apply Patches: Install security patches from the vendor as soon as they become available.
- Disable Remote Access: Disable remote access to the router's management interface if possible.
- Use Strong Passwords: Use strong and unique passwords for the router's administrative account.
- Monitor Network Traffic: Monitor network traffic for suspicious activity and block any unauthorized access attempts.
Additional Information
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
- In the Wild: The vulnerability is actively exploited by hackers.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.