CVE-2024-0295: Critical vulnerability in Totolink LR1200GB allowing for OS command injection, rated HIGH.
This CVE-2024-0295 involves a critical vulnerability in the Totolink LR1200GB 9.1.0u.6619_B20230130 that allows for OS command injection. The vulnerability affects the function setWanCfg in the file /cgi-bin/cstecgi.cgi and could be exploited remotely. The base severity score is rated as HIGH.
Understanding CVE-2024-0295
This section provides insights into the nature and impact of CVE-2024-0295.
What is CVE-2024-0295?
CVE-2024-0295 is a critical vulnerability found in the Totolink LR1200GB 9.1.0u.6619_B20230130, specifically affecting the setWanCfg function by allowing for OS command injection. This manipulation of the argument hostName enables the exploitation of the vulnerability.
The Impact of CVE-2024-0295
The potential impact of CVE-2024-0295 is severe as attackers can remotely initiate OS command injections through the vulnerability. This could lead to unauthorized execution of commands with elevated privileges, posing a significant security risk.
Technical Details of CVE-2024-0295
Delve into the technical aspects of CVE-2024-0295 to better understand its implications and mechanisms.
Vulnerability Description
The vulnerability in Totolink LR1200GB 9.1.0u.6619_B20230130 allows for OS command injection through the setWanCfg function in the file /cgi-bin/cstecgi.cgi. By manipulating the hostName argument, attackers can execute malicious commands remotely.
Affected Systems and Versions
The specific version impacted by CVE-2024-0295 is Totolink LR1200GB 9.1.0u.6619_B20230130. Users operating this version are at risk of exploitation through the setWanCfg function.
Exploitation Mechanism
The exploit leverages the vulnerability in the setWanCfg function of Totolink LR1200GB 9.1.0u.6619_B20230130, allowing attackers to inject OS commands by manipulating the hostName argument remotely.
Mitigation and Prevention
Learn about the necessary measures to mitigate the risks posed by CVE-2024-0295 and prevent potential exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates