CVE-2023-24150

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK T8 routers that allows attackers to execute arbitrary commands via crafted MQTT packets. Attackers can exploit the serverIp parameter in the meshSlaveDlfw function to gain remote code execution. This affects TOTOLINK T8 router users with vulnerable firmware versions.

💻 Affected Systems

Products:
  • TOTOLINK T8
Versions: V4.1.5cu and likely earlier versions
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the meshSlaveDlfw function specifically. MQTT service must be enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, and use the device for botnet activities.

🟠

Likely Case

Remote code execution leading to router compromise, credential theft, DNS hijacking, and network surveillance.

🟢

If Mitigated

Limited impact if proper network segmentation, firewall rules, and MQTT protocol restrictions are in place.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the exploit uses MQTT packets which can traverse firewalls.
🏢 Internal Only: MEDIUM - If the router is not internet-facing, risk is reduced but still present from internal threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repositories. Exploitation requires sending crafted MQTT packets to the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TOTOLINK website for firmware updates
2. Download latest firmware for T8 model
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable MQTT Service

all

Disable MQTT protocol functionality on the router if not required

Network Segmentation

all

Isolate router management interface from untrusted networks

🧯 If You Can't Patch

  • Implement strict firewall rules to block MQTT traffic (port 1883/TCP) from untrusted sources
  • Monitor network traffic for unusual MQTT packets and command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is V4.1.5cu or earlier, assume vulnerable.

Check Version:

Login to router admin interface and check System Status or Firmware Information page

Verify Fix Applied:

Verify firmware version has been updated beyond V4.1.5cu. Test with controlled MQTT packet to confirm command injection is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual MQTT traffic patterns
  • Unexpected command execution in router logs
  • Failed authentication attempts on MQTT service

Network Indicators:

  • MQTT packets with suspicious payloads in serverIp parameter
  • Outbound connections from router to unknown IPs
  • Unusual port 1883 traffic

SIEM Query:

source="router_logs" AND ("meshSlaveDlfw" OR "serverIp" OR "MQTT") AND ("exec" OR "system" OR "command")

🔗 References

📤 Share & Export