Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
A critical vulnerability has been discovered in TOTOLINK A3600R version 4.1.2cu.5182_B20201102. The vulnerability affects the NTPSyncWithHost function in the /cgi-bin/cstecgi.cgi file. By manipulating the hostTime argument, an attacker can perform OS command injection. This vulnerability can be exploited remotely, and a public exploit is available.
This vulnerability allows for remote code execution with potentially severe consequences. An attacker could gain unauthorized access to the system, execute arbitrary commands, and potentially compromise the entire network. The CVSS v3.1 base score of 8.8 (High) indicates high impacts on confidentiality, integrity, and availability. Attackers could potentially steal sensitive information, modify system configurations, or disrupt services.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
As of the latest information provided, no official patch has been released by TOTOLINK. The vendor was contacted about this disclosure but did not respond, which suggests that a patch may not be immediately available.
Given the absence of an official patch, the following mitigation steps are recommended: 1. Disable remote access to the affected TOTOLINK A3600R devices where possible. 2. If remote access is necessary, implement strong network segmentation and access controls to limit exposure. 3. Monitor logs and network traffic for suspicious activities related to the NTPSyncWithHost function. 4. Consider replacing the vulnerable devices with alternative, secure products if patching is not an option. 5. Regularly check for updates from TOTOLINK and apply any security patches as soon as they become available. 6. Implement additional network security measures such as firewalls and intrusion detection systems to help detect and prevent exploitation attempts.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-7171. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-7171
A CVSS base score of 6.3 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.8%)
A CVSS base score of 8.8 has been assigned.
A CVSS base score of 8.8 has been assigned.