First published: Mon Jan 08 2024(Updated: )
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink N200RE-v3 Firmware | =9.3.5u.6139_b20201216 | |
Totolink N200re Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0299 has been declared as critical due to its potential for os command injection.
To fix CVE-2024-0299, it is recommended to upgrade to a patched version of the Totolink N200RE firmware.
CVE-2024-0299 affects the Totolink N200RE router with firmware version 9.3.5u.6139_B20201216.
Os command injection in CVE-2024-0299 occurs when an attacker manipulates inputs to execute arbitrary commands on the operating system.
Detection of CVE-2024-0299 exploitation involves monitoring for unusual command activities or unexpected system behavior on the affected device.