CVE-2024-53333

6.3 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in TOTOLINK EX200 routers that allows attackers to execute arbitrary system commands via the 'ussd' parameter in the setUssd function. Attackers with network access to the router's management interface can potentially gain full control of the device. This affects users of TOTOLINK EX200 routers running vulnerable firmware versions.

💻 Affected Systems

Products:
  • TOTOLINK EX200
Versions: v4.0.3c.7646_B20201211
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface and requires access to the vulnerable endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use the device for botnet activities.

🟠

Likely Case

Router compromise leading to network traffic interception, DNS hijacking, credential theft, and use as a foothold for further attacks on the internal network.

🟢

If Mitigated

Limited impact if the router is not internet-facing and network segmentation prevents lateral movement from compromised devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the router's web interface. The GitHub reference contains proof-of-concept code demonstrating the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check TOTOLINK's official website for firmware updates. If available, download the latest firmware and upload it via the router's web interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the router's web interface

Network Segmentation

all

Isolate the router from critical internal networks

🧯 If You Can't Patch

  • Replace affected routers with supported models from vendors providing security updates
  • Implement strict network access controls to limit who can reach the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System Status > Device Info. If version is v4.0.3c.7646_B20201211 or similar, the device is vulnerable.

Check Version:

No CLI command available. Must use web interface at System Status > Device Info

Verify Fix Applied:

Verify firmware version has been updated to a version newer than v4.0.3c.7646_B20201211

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to setUssd endpoint
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic patterns indicating command and control communication

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/setUssd" OR message="ussd")

🔗 References

📤 Share & Export