CVE-2023-24159
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK CA300-PoE routers by injecting malicious commands into the admpass parameter. Attackers can gain full control of affected devices, potentially compromising network security. All users running vulnerable firmware versions are affected.
💻 Affected Systems
- TOTOLINK CA300-PoE
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover leading to network compromise, data exfiltration, lateral movement to other devices, and persistent backdoor installation.
Likely Case
Unauthorized administrative access allowing configuration changes, credential theft, and use as pivot point for further attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing exploitation attempts.
🎯 Exploit Status
Exploitation requires authentication to the web interface. Public proof-of-concept demonstrates command injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload new firmware file. 6. Wait for reboot.
🔧 Temporary Workarounds
Network Segmentation
allIsolate router management interface from untrusted networks
Access Control
linuxRestrict web interface access to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Disable remote management interface and configure local-only administration
- Implement strict firewall rules to block all inbound traffic to router management ports
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status or About page
Check Version:
curl -s http://router-ip/cgi-bin/getStatus.cgi | grep version
Verify Fix Applied:
Verify firmware version has been updated to a version later than V6.2c.884
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts followed by successful login
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic to known malicious IPs
- Port scanning originating from router
SIEM Query:
source="router.log" AND ("command injection" OR "admpass" OR "setPasswordCfg")