CVE-2024-10654

5.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on TOTOLINK LR350 routers by manipulating the authCode parameter in the /formLoginAuth.htm endpoint. Attackers can gain unauthorized access to router administration without valid credentials. All users running affected firmware versions are vulnerable.

💻 Affected Systems

Products:
  • TOTOLINK LR350
Versions: Up to 9.3.5u.6369
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using affected firmware versions are vulnerable. The /formLoginAuth.htm endpoint is accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to change network settings, intercept traffic, install malware, or use router as pivot point into internal network.

🟠

Likely Case

Unauthorized access to router admin panel enabling network configuration changes, DNS hijacking, or credential theft.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and strong internal network segmentation.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-exposed routers immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to gain router access and pivot within network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending HTTP request with authCode=1 parameter to vulnerable endpoint. Public proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.5u.6698_B20230810

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Download firmware version 9.3.5u.6698_B20230810 from TOTOLINK website. 2. Log into router admin panel. 3. Navigate to System Tools > Firmware Upgrade. 4. Upload new firmware file. 5. Wait for upgrade to complete and router to reboot.

🔧 Temporary Workarounds

Restrict WAN Access

linux

Block external access to router admin interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s ! INTERNAL_NETWORK -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! INTERNAL_NETWORK -j DROP

Disable Remote Management

all

Turn off remote administration feature in router settings

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict access controls
  • Implement network monitoring for unauthorized access attempts to /formLoginAuth.htm

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://ROUTER_IP/formLoginAuth.htm?authCode=1 and check if admin access is granted without credentials

Check Version:

Check router web interface System Status page or use curl -s http://ROUTER_IP/ | grep -i version

Verify Fix Applied:

Attempt same exploit after upgrade - should receive authentication error or redirect to login page

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /formLoginAuth.htm with authCode parameter
  • Successful admin logins from unusual IP addresses
  • Multiple failed login attempts followed by successful auth bypass

Network Indicators:

  • HTTP traffic to router IP on port 80/443 containing 'authCode=1' parameter
  • Unusual admin panel access patterns

SIEM Query:

source="router_logs" AND (uri="/formLoginAuth.htm" OR (uri="/" AND status=200 AND referer CONTAINS "formLoginAuth.htm"))

🔗 References

📤 Share & Export