CVE-2024-42966

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to retrieve the apmib configuration file containing administrative credentials from TOTOLINK N350RT routers via a crafted request to /cgi-bin/ExportSettings.sh. Attackers can gain full administrative access to affected routers, potentially compromising network security. All users of affected TOTOLINK N350RT routers with vulnerable firmware are at risk.

💻 Affected Systems

Products:
  • TOTOLINK N350RT
Versions: V9.3.5u.6139_B20201216
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with web management interface accessible. The vulnerability is present in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, take full control of the router, intercept all network traffic, deploy malware to connected devices, and use the router as a pivot point for attacking internal networks.

🟠

Likely Case

Attackers obtain administrative credentials and reconfigure the router for malicious purposes such as DNS hijacking, traffic interception, or creating a persistent backdoor.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself rather than the entire network.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a simple HTTP request to the vulnerable endpoint. Public proof-of-concept documentation exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check TOTOLINK website for firmware updates. If available, download latest firmware and upload via router web interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Block Access to ExportSettings.sh

linux

Use router firewall rules to block access to the vulnerable endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "ExportSettings.sh" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "ExportSettings.sh" --algo bm -j DROP

Disable Web Management Interface

all

Disable remote web management if not required

Access router web interface > Advanced > Remote Management > Disable

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict firewall rules
  • Change administrative credentials and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[router-ip]/cgi-bin/ExportSettings.sh and check if configuration file is returned

Check Version:

Check router web interface > Status > Device Info or login via SSH/Telnet and run 'cat /proc/version'

Verify Fix Applied:

Attempt the same request after applying fixes - should return error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /cgi-bin/ExportSettings.sh
  • Unauthorized configuration export attempts
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • HTTP GET requests to ExportSettings.sh endpoint
  • Unusual traffic patterns from router to external IPs

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/ExportSettings.sh" OR method="GET" AND uri CONTAINS "ExportSettings")

🔗 References

📤 Share & Export