CVE-2024-57211
📋 TL;DR
This CVE describes a command injection vulnerability in TOTOLINK A6000R routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending specially crafted requests to the vulnerable enable_wsh function. This affects users running the vulnerable firmware version on TOTOLINK A6000R routers.
💻 Affected Systems
- TOTOLINK A6000R
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to establish persistent access, intercept network traffic, pivot to internal networks, and potentially brick the device.
Likely Case
Attackers gain shell access to the router, enabling them to modify configurations, intercept traffic, and use the device as a foothold for further attacks.
If Mitigated
Limited impact if network segmentation prevents lateral movement and external access to the router's management interface is blocked.
🎯 Exploit Status
Exploitation requires sending crafted HTTP requests to the vulnerable endpoint. The provided references contain technical details but no ready-to-use exploit code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check TOTOLINK website for latest firmware
Vendor Advisory: Not provided in CVE references
Restart Required: Yes
Instructions:
1. Visit TOTOLINK support website. 2. Download latest firmware for A6000R. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router management interface
Network segmentation
allIsolate router management interface to trusted network segments
🧯 If You Can't Patch
- Restrict access to router management interface using firewall rules
- Monitor network traffic for unusual patterns or command injection attempts
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Verify firmware version has been updated to a version later than V1.0.1-B20201211.2000
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to enable_wsh endpoint
- Suspicious command strings in web server logs
Network Indicators:
- HTTP POST requests to router management interface containing shell metacharacters
SIEM Query:
Not provided - monitor for command injection patterns in web traffic