CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8577

Critical Severity
Totolink
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.00254/1

CVE-2024-8577: Critical buffer overflow vulnerability in TOTOLINK AC1200 T8 and T10 routers. This vulnerability, found in the setStaticDhcpRules function of /cgi-bin/cstecgi.cgi, allows remote attackers to execute arbitrary code by manipulating the 'desc' argument. The CVSS score is 8.8, and while the SOCRadar Vulnerability Risk Score (SVRS) is 77, indicating high risk, it's close to the critical threshold. With a public exploit available and no vendor response, immediate patching or mitigation is strongly advised to prevent potential remote code execution. This buffer overflow could lead to complete system compromise.

No tags available
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-09-08

2024-09-09
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8577 is a critical vulnerability in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It allows remote attackers to execute arbitrary code on affected devices by manipulating the desc argument in the setStaticDhcpRules function of the /cgi-bin/cstecgi.cgi file. The vulnerability has been publicly disclosed and may be actively exploited.

Key Insights

  • The CVSS score of 8.8 indicates a high severity vulnerability.
  • The SVRS of 82 signifies a critical vulnerability that requires immediate attention.
  • The vulnerability can be exploited remotely, making it easy for attackers to target affected devices.
  • The vendor has not responded to the disclosure, leaving users vulnerable to exploitation.

Mitigation Strategies

  • Update to the latest firmware version as soon as possible.
  • Disable remote access to the affected devices.
  • Implement network segmentation to limit the spread of an attack.
  • Monitor network traffic for suspicious activity.

Additional Information

  • Threat Actors/APT Groups: Not specified
  • Exploit Status: Active exploits have been published
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
  • In the Wild: The vulnerability is actively exploited by hackers

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

[CVE-2024-8577: HIGH] Critical vulnerability discovered in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. Remote buffer overflow exploit disclosed to the public due to vendor's lack of respo...#cybersecurity,#vulnerability https://t.co/Y2GVH6m3OY https://t.co/JpkxwN5BAd
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSTotolinkt8_firmware
Configuration 2
TypeVendorProduct
OSTotolinkt10_firmware

References

ReferenceLink
[email protected]https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md
[email protected]https://vuldb.com/?ctiid.276811
[email protected]https://vuldb.com/?id.276811
[email protected]https://vuldb.com/?submit.401265
[email protected]https://www.totolink.net/
GITHUBhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md

CWE Details

CWE IDCWE NameDescription
CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence