CVE-2024-0571
📋 TL;DR
A critical stack-based buffer overflow vulnerability in Totolink LR1200GB routers allows remote attackers to execute arbitrary code by manipulating the 'text' parameter in the setSmsCfg function. This affects users of Totolink LR1200GB routers running firmware version 9.1.0u.6619_B20230130. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- Totolink LR1200GB
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, persistence, lateral movement, and data exfiltration.
Likely Case
Remote code execution allowing attackers to take control of the router, modify configurations, intercept traffic, or use as a botnet node.
If Mitigated
Limited impact if device is isolated behind firewalls with strict network segmentation and access controls.
🎯 Exploit Status
Exploit code is publicly available in GitHub repositories. The vulnerability requires no authentication and has straightforward exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Contact Totolink support for firmware updates. Consider replacing affected devices if no patch is forthcoming.
🔧 Temporary Workarounds
Network Isolation
linuxIsolate affected routers from internet and restrict access to management interface
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Disable Remote Management
allDisable web management interface or restrict to local network only
🧯 If You Can't Patch
- Replace affected Totolink LR1200GB routers with patched or alternative devices
- Implement strict network segmentation to isolate vulnerable routers from critical assets
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface at http://[router-ip]/ or using command: cat /proc/version
Check Version:
curl -s http://[router-ip]/cgi-bin/cstecgi.cgi | grep -i version
Verify Fix Applied:
Verify firmware version has been updated beyond 9.1.0u.6619_B20230130
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /cgi-bin/cstecgi.cgi with long text parameters
- Multiple failed exploitation attempts
- Unexpected process execution or system reboots
Network Indicators:
- Unusual outbound connections from router
- Traffic interception patterns
- Port scanning originating from router
SIEM Query:
source="router_logs" AND uri="/cgi-bin/cstecgi.cgi" AND method="POST" AND text_length>1000