CVE-2024-46451

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK AC1200 T8 routers by exploiting a buffer overflow in the setWiFiAclRules function. Attackers can gain full control of affected devices, potentially compromising network security. Only users of specific TOTOLINK router models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • TOTOLINK AC1200 T8
Versions: v4.1.5cu.861_B20230220
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web interface configuration. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to other network devices.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a foothold for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains technical details that could facilitate exploit development. Buffer overflow vulnerabilities in network devices are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check TOTOLINK official website for firmware updates. 2. Download latest firmware for AC1200 T8. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the vulnerable web interface by disabling remote administration features.

Network Segmentation

all

Isolate the router on a separate VLAN with strict firewall rules limiting inbound connections.

🧯 If You Can't Patch

  • Replace vulnerable devices with supported models from different vendors
  • Implement strict network monitoring and intrusion detection for suspicious traffic to/from the router

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to System Status or About page, check firmware version matches v4.1.5cu.861_B20230220.

Check Version:

curl -s http://router-ip/cgi-bin/luci/ | grep -i version

Verify Fix Applied:

After firmware update, verify version no longer matches vulnerable version. Test setWiFiAclRules functionality with fuzzing tools if available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to setWiFiAclRules endpoint
  • Large payloads in HTTP requests to router management interface
  • Multiple failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from router to unknown IPs
  • Traffic patterns suggesting command and control communication
  • Port scanning originating from router

SIEM Query:

source="router-logs" AND (uri="/cgi-bin/luci" OR method="POST") AND (bytes>10000 OR status=500)

🔗 References

📤 Share & Export