CVE-2024-32350

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on TOTOLINK X5000R routers by exploiting improper input validation in the ipsecPsk parameter. Attackers with valid credentials can gain full system control. Only TOTOLINK X5000R routers running the affected firmware are impacted.

💻 Affected Systems

Products:
  • TOTOLINK X5000R
Versions: V9.1.0cu.2350_B20230313
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default credentials may be present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept network traffic, pivot to internal networks, install persistent backdoors, or use the device for botnet activities.

🟠

Likely Case

Attackers with stolen or default credentials execute commands to reconfigure the router, steal credentials, or deploy malware on connected devices.

🟢

If Mitigated

Limited to authenticated users only, with proper credential management reducing attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Upload via router admin interface. 4. Reboot router.

🔧 Temporary Workarounds

Disable Remote Administration

all

Prevent external access to router administration interface

Change Default Credentials

all

Use strong, unique passwords for router admin accounts

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments
  • Implement strict firewall rules to limit access to router administration interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is V9.1.0cu.2350_B20230313, device is vulnerable.

Check Version:

Check router web interface or use nmap to identify device version

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V9.1.0cu.2350_B20230313.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to cstecgi.cgi with ipsecPsk parameter
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command execution

SIEM Query:

source_ip="router_ip" AND (uri="*/cstecgi.cgi*" OR method="POST" AND params CONTAINS "ipsecPsk")

🔗 References

📤 Share & Export