ID

VAR-202409-0812


CVE

CVE-2024-9001


TITLE

TOTOLINK  of  t10  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2024-008864

DESCRIPTION

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of t10 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK T10 is a wireless network system router produced by China's TOTOLINK Electronics. No detailed vulnerability details are provided at present

Trust: 2.16

sources: NVD: CVE-2024-9001 // JVNDB: JVNDB-2024-008864 // CNVD: CNVD-2025-12405

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12405

AFFECTED PRODUCTS

vendor:totolinkmodel:t10scope:eqversion:4.1.8cu.5207

Trust: 1.0

vendor:totolinkmodel:t10scope:eqversion:t10 firmware 4.1.8cu.5207

Trust: 0.8

vendor:totolinkmodel:t10scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:t10scope: - version: -

Trust: 0.8

vendor:totolinkmodel:t10 4.1.8cu.5207scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-12405 // JVNDB: JVNDB-2024-008864 // NVD: CVE-2024-9001

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-9001
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-9001
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-008864
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-12405
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2024-9001
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2024-008864
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12405
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-9001
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-9001
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2024-008864
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12405 // JVNDB: JVNDB-2024-008864 // NVD: CVE-2024-9001 // NVD: CVE-2024-9001

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-008864 // NVD: CVE-2024-9001

EXTERNAL IDS

db:NVDid:CVE-2024-9001

Trust: 3.2

db:VULDBid:278152

Trust: 1.8

db:JVNDBid:JVNDB-2024-008864

Trust: 0.8

db:CNVDid:CNVD-2025-12405

Trust: 0.6

sources: CNVD: CNVD-2025-12405 // JVNDB: JVNDB-2024-008864 // NVD: CVE-2024-9001

REFERENCES

url:https://github.com/c9y57/totolink_settraceroutecfg/blob/main/settraceroutecfg.md

Trust: 1.8

url:https://vuldb.com/?id.278152

Trust: 1.8

url:https://vuldb.com/?submit.406140

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.278152

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2024-9001

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2024-9001/

Trust: 0.6

sources: CNVD: CNVD-2025-12405 // JVNDB: JVNDB-2024-008864 // NVD: CVE-2024-9001

SOURCES

db:CNVDid:CNVD-2025-12405
db:JVNDBid:JVNDB-2024-008864
db:NVDid:CVE-2024-9001

LAST UPDATE DATE

2025-06-15T23:37:18.860000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12405date:2025-06-13T00:00:00
db:JVNDBid:JVNDB-2024-008864date:2024-09-25T02:10:00
db:NVDid:CVE-2024-9001date:2024-09-24T16:14:30.190

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12405date:2025-06-13T00:00:00
db:JVNDBid:JVNDB-2024-008864date:2024-09-25T00:00:00
db:NVDid:CVE-2024-9001date:2024-09-19T20:15:07.810