TOTOLINK.X18.setOpModeCfg.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection vulnerability in the TOTOLINK X18 Wi-Fi router.
The vulnerability is caused by a lack of sanitation to arguments passed to the setOpModeCfg function within cstecgi.cgi. An attacker can exploit this with a crafted request to execute arbitrary commands within the context of the system.

affected-products-logoAffected Products

Totolink X18 version 9.1.0cu.2024_B20220329
Totolink X18 version 9.1.0cu.2021_B20220326

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently, we are unaware of any vendor supplied patch or updates available for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-04-03 27.760 Sig Added
2024-03-26 27.755 Status:disable:enable
2024-03-19 27.751 Name:Totolink.
X18.
setOpModeCfg.
Command.
Injection:TOTOLINK.
X18.
setOpModeCfg.
Command.
Injection
2024-03-14 27.749