CVE-2024-34198
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code or cause denial-of-service on TOTOLINK AC1200 routers by sending specially crafted HTTP requests with an overly long SSID field. It affects TOTOLINK AC1200 Wireless Router A3002RU version 2.1.1-B20230720.1011. Attackers can exploit this remotely without authentication.
💻 Affected Systems
- TOTOLINK AC1200 Wireless Router A3002RU
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with remote code execution, allowing attackers to take complete control of the router, intercept network traffic, pivot to internal networks, or install persistent malware.
Likely Case
Router crash leading to denial-of-service, disrupting internet connectivity for all connected devices until manual reboot.
If Mitigated
Limited impact if router is behind firewall with restricted HTTP access, though internal attackers could still exploit.
🎯 Exploit Status
The GitHub reference contains technical details and proof-of-concept code. Exploitation requires crafting a simple HTTP POST request with a long wlan_ssid parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: Yes
Instructions:
1. Check TOTOLINK website for firmware updates. 2. Download latest firmware for A3002RU model. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router after installation.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router web interface
Restrict Web Interface Access
allConfigure firewall to block HTTP/HTTPS access to router from untrusted networks
🧯 If You Can't Patch
- Replace vulnerable router with a different model that has no known buffer overflow vulnerabilities
- Place router behind a dedicated firewall that filters HTTP requests containing long SSID parameters
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under System Tools > Firmware Version. If version is V2.1.1-B20230720.1011, the device is vulnerable.
Check Version:
curl -s http://router-ip/cgi-bin/status | grep Firmware
Verify Fix Applied:
After firmware update, verify version has changed from V2.1.1-B20230720.1011. Test by attempting to send a long SSID value via HTTP POST to /cgi-bin/formWlEncrypt.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /cgi-bin/formWlEncrypt with unusually long wlan_ssid parameter
- Router crash/reboot logs
- Boa web server segmentation fault errors
Network Indicators:
- HTTP traffic to router on port 80/443 with POST requests containing wlan_ssid parameter exceeding normal SSID length (32 characters)
- Multiple connection attempts to router web interface from single source
SIEM Query:
source="router_logs" AND (uri="/cgi-bin/formWlEncrypt" AND content_length>500) OR (message="segmentation fault" AND process="boa")