CVE-2024-37637

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK A3700R routers via a stack overflow in the setWizardCfg function. Attackers can exploit this by sending specially crafted requests to the vulnerable device. All users running the affected firmware version are at risk.

💻 Affected Systems

Products:
  • TOTOLINK A3700R
Versions: V9.1.2u.6165_20211012
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to remote code execution, persistent backdoor installation, network traffic interception, and lateral movement to other devices.

🟠

Likely Case

Router takeover enabling DNS hijacking, credential theft, and botnet recruitment for DDoS attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and proper network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available in GitHub repository. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: Yes

Instructions:

1. Check TOTOLINK official website for firmware updates
2. Download latest firmware for A3700R
3. Log into router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Login to router admin panel
Navigate to System Tools > Remote Management
Disable remote management access

Network Segmentation

all

Isolate router management interface from untrusted networks

Configure firewall rules to block WAN access to router management ports (typically 80/443)
Restrict management access to specific trusted IP addresses only

🧯 If You Can't Patch

  • Replace affected router with supported model
  • Deploy network firewall with strict inbound rules blocking router management ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or Firmware Upgrade section

Check Version:

Login to router web interface and check System Information page

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V9.1.2u.6165_20211012

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to setWizardCfg endpoint
  • Multiple failed authentication attempts followed by successful exploitation
  • Abnormal process creation or system reboots

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic spikes indicating DDoS participation

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/setWizardCfg" OR process="exploit")

🔗 References

📤 Share & Export