CVE-2024-52723

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK X6000R routers by exploiting insufficient parameter filtering in the shttpd file's Uci_Set Str function. Attackers can achieve full system compromise without authentication. All users running the affected firmware version are vulnerable.

💻 Affected Systems

Products:
  • TOTOLINK X6000R
Versions: V9.4.0cu.1041_B20240224
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only this specific firmware version is confirmed vulnerable. Other versions may be affected but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and brick the device.

🟠

Likely Case

Router compromise leading to credential theft, DNS hijacking, man-in-the-middle attacks, and botnet recruitment.

🟢

If Mitigated

Limited impact if device is behind strict firewall rules, not internet-facing, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this unauthenticated RCE allows direct remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, but external exposure is the primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub gist. Exploitation requires crafting specific HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://x6000r.com

Restart Required: Yes

Instructions:

1. Check vendor website for updated firmware. 2. Download and verify firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload new firmware file. 6. Wait for reboot and verify version.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Restrict Access with Firewall

linux

Block external access to router web interface ports (typically 80/443)

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict access controls
  • Implement network monitoring for suspicious HTTP requests to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or About page

Check Version:

curl -s http://router-ip/cgi-bin/luci/ | grep -i version

Verify Fix Applied:

Verify firmware version has changed from V9.4.0cu.1041_B20240224

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to shttpd endpoints
  • Multiple failed login attempts followed by successful command execution patterns

Network Indicators:

  • HTTP requests containing shell metacharacters or command injection patterns to router IP
  • Outbound connections from router to suspicious IPs

SIEM Query:

source="router.log" AND ("Uci_Set" OR "shttpd") AND (cmd.exe OR /bin/sh OR wget OR curl)

🔗 References

📤 Share & Export