ID

VAR-202405-0384


CVE

CVE-2024-32350


TITLE

TOTOLINK  of  X5000R  Code injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-021521

DESCRIPTION

TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the "ipsecPsk" parameter in the "cstecgi.cgi" binary. TOTOLINK of X5000R A code injection vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X5000R is a router of China's TOTOLINK Electronics. TOTOLINK X5000R has a code execution vulnerability, which is caused by the ipsecPsk parameter of cstecgi.cgi failing to properly filter special elements of the constructed code segment. Attackers can exploit this vulnerability to cause arbitrary code execution

Trust: 2.16

sources: NVD: CVE-2024-32350 // JVNDB: JVNDB-2024-021521 // CNVD: CNVD-2024-40409

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-40409

AFFECTED PRODUCTS

vendor:totolinkmodel:x5000rscope:eqversion:9.1.0cu.2350_b20230313

Trust: 1.0

vendor:totolinkmodel:x5000rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:x5000rscope:eqversion:x5000r firmware 9.1.0cu.2350 b20230313

Trust: 0.8

vendor:totolinkmodel:x5000rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:x5000r v9.1.0cu.2350 b20230313scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-40409 // JVNDB: JVNDB-2024-021521 // NVD: CVE-2024-32350

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32350
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-021521
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-40409
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-40409
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32350
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-021521
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-40409 // JVNDB: JVNDB-2024-021521 // NVD: CVE-2024-32350

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.0

problemtype:Code injection (CWE-94) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-021521 // NVD: CVE-2024-32350

EXTERNAL IDS

db:NVDid:CVE-2024-32350

Trust: 3.2

db:JVNDBid:JVNDB-2024-021521

Trust: 0.8

db:CNVDid:CNVD-2024-40409

Trust: 0.6

sources: CNVD: CNVD-2024-40409 // JVNDB: JVNDB-2024-021521 // NVD: CVE-2024-32350

REFERENCES

url:https://github.com/1s1and123/vulnerabilities/blob/main/device/totolink/x5000r/totolink_x5000r_rce.md

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-32350

Trust: 1.4

sources: CNVD: CNVD-2024-40409 // JVNDB: JVNDB-2024-021521 // NVD: CVE-2024-32350

SOURCES

db:CNVDid:CNVD-2024-40409
db:JVNDBid:JVNDB-2024-021521
db:NVDid:CVE-2024-32350

LAST UPDATE DATE

2025-04-08T22:57:38.649000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-40409date:2024-10-11T00:00:00
db:JVNDBid:JVNDB-2024-021521date:2025-04-07T07:14:00
db:NVDid:CVE-2024-32350date:2025-04-04T14:28:22.133

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-40409date:2024-10-11T00:00:00
db:JVNDBid:JVNDB-2024-021521date:2025-04-07T00:00:00
db:NVDid:CVE-2024-32350date:2024-05-14T16:17:02.543