Cyber Posture

CVE-2024-57018

HighPublic PoC

Published: 15 January 2025

Published
15 January 2025
Modified
13 March 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0252 85.5th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "desc" parameter in setVpnAccountCfg.

Security Summary

CVE-2024-57018 is an OS command injection vulnerability (CWE-78) affecting the TOTOLINK X5000R router running firmware version V9.1.0cu.2350_B20230313. The flaw exists in the setVpnAccountCfg function, where the "desc" parameter fails to properly sanitize user input, allowing injection of arbitrary operating system commands. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and potential for significant impact on confidentiality, integrity, and availability.

A remote attacker with low privileges, such as an authenticated user on the device, can exploit this vulnerability over the network without user interaction. By crafting a malicious request to the vulnerable endpoint with injected commands in the "desc" parameter, the attacker can execute arbitrary OS commands on the underlying system. Successful exploitation enables full control over the router, including data exfiltration, modification of configurations, service disruption, or use as a pivot for further network attacks.

For mitigation details, refer to the vulnerability advisory at https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setVpnAccountCfg/setVpnAccountCfg.md and the vendor's security page at https://www.totolink.net/. Practitioners should check these resources for patches, workarounds, or firmware updates addressing this issue.

Details

CWE(s)
CWE-78

Affected Products

totolink
x5000r firmware
9.1.0cu.2350_b20230313

References