ID

VAR-202401-0298


CVE

CVE-2024-0294


TITLE

TOTOLINK  of  lr1200gb  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2024-001220

DESCRIPTION

A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this issue is the function setUssd of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ussd leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249860. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of lr1200gb The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK LR1200GB is a dual-band 4G LTE wireless router manufactured by TOTOLINK, a Chinese company. It supports both 2.4GHz and 5GHz dual-band networks and is primarily used to provide mobile broadband connectivity and Wi-Fi coverage. This vulnerability stems from the fact that the `ussd` parameter of the `setUssd` function on the `/cgi-bin/cstecgi.cgi` page fails to properly filter special characters and commands used in constructing commands. Detailed vulnerability information is currently unavailable

Trust: 2.25

sources: NVD: CVE-2024-0294 // JVNDB: JVNDB-2024-001220 // CNVD: CNVD-2025-30280 // VULMON: CVE-2024-0294

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-30280

AFFECTED PRODUCTS

vendor:totolinkmodel:lr1200gbscope:eqversion:9.1.0u.6619_b20230130

Trust: 1.0

vendor:totolinkmodel:lr1200gbscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:lr1200gbscope:eqversion:lr1200gb firmware 9.1.0u.6619 b20230130

Trust: 0.8

vendor:totolinkmodel:lr1200gbscope: - version: -

Trust: 0.8

vendor:totolinkmodel:lr1200gb 9.1.0u.6619 b20230130scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-30280 // JVNDB: JVNDB-2024-001220 // NVD: CVE-2024-0294

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-0294
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-0294
value: CRITICAL

Trust: 1.0

NVD: CVE-2024-0294
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-30280
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2024-0294
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-30280
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-0294
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-0294
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-0294
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-30280 // JVNDB: JVNDB-2024-001220 // NVD: CVE-2024-0294 // NVD: CVE-2024-0294

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-001220 // NVD: CVE-2024-0294

PATCH

title:Patch for TOTOLINK LR1200GB setUssd function operating system command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/778496

Trust: 0.6

sources: CNVD: CNVD-2025-30280

EXTERNAL IDS

db:NVDid:CVE-2024-0294

Trust: 3.3

db:VULDBid:249860

Trust: 2.5

db:JVNDBid:JVNDB-2024-001220

Trust: 0.8

db:CNVDid:CNVD-2025-30280

Trust: 0.6

db:VULMONid:CVE-2024-0294

Trust: 0.1

sources: CNVD: CNVD-2025-30280 // VULMON: CVE-2024-0294 // JVNDB: JVNDB-2024-001220 // NVD: CVE-2024-0294

REFERENCES

url:https://vuldb.com/?id.249860

Trust: 2.5

url:https://github.com/jylsec/vuldb/blob/main/totolink/lr1200gb/setussd/readme.md

Trust: 1.9

url:https://vuldb.com/?ctiid.249860

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-0294

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-30280 // VULMON: CVE-2024-0294 // JVNDB: JVNDB-2024-001220 // NVD: CVE-2024-0294

SOURCES

db:CNVDid:CNVD-2025-30280
db:VULMONid:CVE-2024-0294
db:JVNDBid:JVNDB-2024-001220
db:NVDid:CVE-2024-0294

LAST UPDATE DATE

2025-12-19T23:03:10.058000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-30280date:2025-12-09T00:00:00
db:VULMONid:CVE-2024-0294date:2024-01-08T00:00:00
db:JVNDBid:JVNDB-2024-001220date:2024-02-01T05:41:00
db:NVDid:CVE-2024-0294date:2024-05-17T02:34:29.590

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-30280date:2025-12-08T00:00:00
db:VULMONid:CVE-2024-0294date:2024-01-08T00:00:00
db:JVNDBid:JVNDB-2024-001220date:2024-02-01T00:00:00
db:NVDid:CVE-2024-0294date:2024-01-08T03:15:14.050