ID

VAR-202405-1577


CVE

CVE-2024-32351


TITLE

TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2024-021799

DESCRIPTION

TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the "mru" parameter in the "cstecgi.cgi" binary. TOTOLINK of X5000R The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK X5000R is a router of China's TOTOLINK Electronics. TOTOLINK X5000R has a code execution vulnerability, which is caused by the parameter mru of cstecgi.cgi failing to properly filter special elements in the constructed code segment. Attackers can exploit this vulnerability to cause arbitrary code execution

Trust: 2.16

sources: NVD: CVE-2024-32351 // JVNDB: JVNDB-2024-021799 // CNVD: CNVD-2024-40410

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-40410

AFFECTED PRODUCTS

vendor:totolinkmodel:x5000rscope:eqversion:9.1.0cu.2350_b20230313

Trust: 1.0

vendor:totolinkmodel:x5000rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:x5000rscope:eqversion:x5000r firmware 9.1.0cu.2350 b20230313

Trust: 0.8

vendor:totolinkmodel:x5000rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:x5000r v9.1.0cu.2350 b20230313scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-40410 // JVNDB: JVNDB-2024-021799 // NVD: CVE-2024-32351

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32351
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-021799
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-40410
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-40410
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32351
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-021799
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-40410 // JVNDB: JVNDB-2024-021799 // NVD: CVE-2024-32351

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-021799 // NVD: CVE-2024-32351

EXTERNAL IDS

db:NVDid:CVE-2024-32351

Trust: 3.2

db:JVNDBid:JVNDB-2024-021799

Trust: 0.8

db:CNVDid:CNVD-2024-40410

Trust: 0.6

sources: CNVD: CNVD-2024-40410 // JVNDB: JVNDB-2024-021799 // NVD: CVE-2024-32351

REFERENCES

url:https://github.com/1s1and123/vulnerabilities/blob/main/device/totolink/x5000r/totolink_x5000r_rce.md

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-32351

Trust: 1.4

sources: CNVD: CNVD-2024-40410 // JVNDB: JVNDB-2024-021799 // NVD: CVE-2024-32351

SOURCES

db:CNVDid:CNVD-2024-40410
db:JVNDBid:JVNDB-2024-021799
db:NVDid:CVE-2024-32351

LAST UPDATE DATE

2025-04-11T23:11:43.998000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-40410date:2024-10-11T00:00:00
db:JVNDBid:JVNDB-2024-021799date:2025-04-10T02:59:00
db:NVDid:CVE-2024-32351date:2025-04-04T14:28:12.620

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-40410date:2024-10-11T00:00:00
db:JVNDBid:JVNDB-2024-021799date:2025-04-10T00:00:00
db:NVDid:CVE-2024-32351date:2024-05-14T16:17:02.800