CVE-2023-24236

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on TOTOLink A7100RU routers by injecting malicious commands into the province parameter. Attackers can gain full control of affected devices, potentially compromising entire networks. Only users with TOTOLink A7100RU routers running specific vulnerable firmware are affected.

💻 Affected Systems

Products:
  • TOTOLink A7100RU
Versions: V7.4cu.2313_B20191024
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. Requires access to web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network compromise, data exfiltration, ransomware deployment, or use as botnet node for DDoS attacks.

🟠

Likely Case

Router compromise allowing traffic interception, credential theft, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact with proper network segmentation and firewall rules preventing external access to management interface.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces accessible from WAN.
🏢 Internal Only: MEDIUM - Attackers would need internal network access, but once inside, exploitation is trivial.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to the router's web interface. Public PoC available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TOTOLink website for firmware updates
2. Download latest firmware for A7100RU
3. Access router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload new firmware file
6. Wait for reboot (do not interrupt power)

🔧 Temporary Workarounds

Disable WAN Management Access

all

Prevent external access to router management interface

Access router web interface > Security > Remote Management > Disable

Network Segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace affected routers with supported models from different vendors
  • Implement strict firewall rules blocking all external access to router management ports (typically 80, 443, 8080)

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface: System Tools > Firmware Version. If version is V7.4cu.2313_B20191024, device is vulnerable.

Check Version:

curl -s http://router-ip/ | grep -i firmware || ssh admin@router-ip 'cat /etc/version'

Verify Fix Applied:

After firmware update, verify version has changed from vulnerable version. Test province parameter with safe payload to confirm command injection is patched.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /setting/delStaticDhcpRules with shell metacharacters in province parameter
  • Unexpected command execution in system logs

Network Indicators:

  • Unusual outbound connections from router to external IPs
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router-logs" AND uri_path="/setting/delStaticDhcpRules" AND (param="province" AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export