ID

VAR-202302-0177


CVE

CVE-2023-24154


TITLE

TOTOLINK T8  Command injection vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-003077

DESCRIPTION

TOTOLINK T8 V4.1.5cu was discovered to contain a command injection vulnerability via the slaveIpList parameter in the function setUpgradeFW. (DoS) It may be in a state. The TOTOLINK T8 is a wireless dual-band router primarily used for network connectivity and data transmission. This vulnerability stems from the failure of the slaveIpList parameter in the setUpgradeFW method to properly filter special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands

Trust: 2.25

sources: NVD: CVE-2023-24154 // JVNDB: JVNDB-2023-003077 // CNVD: CNVD-2025-20960 // VULMON: CVE-2023-24154

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20960

AFFECTED PRODUCTS

vendor:totolinkmodel:t8scope:eqversion:v4.1.5cu

Trust: 1.0

vendor:totolinkmodel:t8scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:t8scope:eqversion:t8 firmware 4.1.5cu

Trust: 0.8

vendor:totolinkmodel:t8 v4.1.5cuscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-20960 // JVNDB: JVNDB-2023-003077 // NVD: CVE-2023-24154

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24154
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-24154
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-24154
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-20960
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202302-209
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2025-20960
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-24154
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-24154
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-20960 // CNNVD: CNNVD-202302-209 // JVNDB: JVNDB-2023-003077 // NVD: CVE-2023-24154 // NVD: CVE-2023-24154

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-003077 // NVD: CVE-2023-24154

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-209

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202302-209

PATCH

title:Top Pageurl:https://www.totolink.tw/

Trust: 0.8

sources: JVNDB: JVNDB-2023-003077

EXTERNAL IDS

db:NVDid:CVE-2023-24154

Trust: 3.9

db:JVNDBid:JVNDB-2023-003077

Trust: 0.8

db:CNVDid:CNVD-2025-20960

Trust: 0.6

db:CNNVDid:CNNVD-202302-209

Trust: 0.6

db:VULMONid:CVE-2023-24154

Trust: 0.1

sources: CNVD: CNVD-2025-20960 // VULMON: CVE-2023-24154 // CNNVD: CNNVD-202302-209 // JVNDB: JVNDB-2023-003077 // NVD: CVE-2023-24154

REFERENCES

url:https://github.com/double-q1015/cve-vulns/blob/main/totolink_t8/setupgradefw/setupgradefw.md

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24154

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-24154/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-20960 // VULMON: CVE-2023-24154 // CNNVD: CNNVD-202302-209 // JVNDB: JVNDB-2023-003077 // NVD: CVE-2023-24154

SOURCES

db:CNVDid:CNVD-2025-20960
db:VULMONid:CVE-2023-24154
db:CNNVDid:CNNVD-202302-209
db:JVNDBid:JVNDB-2023-003077
db:NVDid:CVE-2023-24154

LAST UPDATE DATE

2025-09-12T23:36:37.992000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-20960date:2025-09-10T00:00:00
db:VULMONid:CVE-2023-24154date:2023-02-03T00:00:00
db:CNNVDid:CNNVD-202302-209date:2023-02-13T00:00:00
db:JVNDBid:JVNDB-2023-003077date:2023-08-31T02:28:00
db:NVDid:CVE-2023-24154date:2025-03-26T16:15:18.787

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-20960date:2025-09-10T00:00:00
db:VULMONid:CVE-2023-24154date:2023-02-03T00:00:00
db:CNNVDid:CNNVD-202302-209date:2023-02-03T00:00:00
db:JVNDBid:JVNDB-2023-003077date:2023-08-31T00:00:00
db:NVDid:CVE-2023-24154date:2023-02-03T16:15:14.667