CVE-2024-0298 advisory: Critical vulnerability in Totolink N200RE 9.3.5u.6139_B20201216 allows OS command injection, leading to unauthorized remote command execution.
This article provides an overview of CVE-2024-0298, a critical vulnerability found in Totolink N200RE 9.3.5u.6139_B20201216, allowing for OS command injection through the setDiagnosisCfg function in the file /cgi-bin/cstecgi.cgi.
Understanding CVE-2024-0298
CVE-2024-0298 is a critical vulnerability affecting Totolink N200RE 9.3.5u.6139_B20201216, enabling OS command injection via the setDiagnosisCfg function in the /cgi-bin/cstecgi.cgi file.
What is CVE-2024-0298?
The vulnerability in Totolink N200RE allows an attacker to execute malicious commands through the manipulation of the 'ip' argument, facilitating remote attacks. The exploit has been publicly disclosed, with the identifier VDB-249864.
The Impact of CVE-2024-0298
The impact of CVE-2024-0298 is significant, with a High severity base score of 7.3 in CVSS v3.1. This vulnerability can lead to unauthorized remote command execution, potentially compromising the security of affected systems.
Technical Details of CVE-2024-0298
The following technical details shed light on the vulnerability:
Vulnerability Description
The vulnerability arises from improper input validation in the 'ip' argument of the setDiagnosisCfg function, allowing for OS command injection.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability remotely by manipulating the 'ip' argument, enabling the execution of malicious commands on the target system.
Mitigation and Prevention
To address CVE-2024-0298, the following steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Check with Totolink for official patches or updates to address the CVE-2024-0298 vulnerability on the affected N200RE devices. Ensure timely application of security fixes to safeguard your systems against potential threats.