First published: Tue Mar 26 2024(Updated: )
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the "setOpModeCfg" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user "root").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3300r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27521 is classified as a critical vulnerability due to its potential for unauthenticated remote command execution.
To mitigate CVE-2024-27521, it is recommended to update the TOTOLINK A3300R firmware to the latest version provided by the vendor.
CVE-2024-27521 specifically affects the TOTOLINK A3300R router model running version V17.0.0cu.557_B20221024.
Exploitation of CVE-2024-27521 allows an attacker to gain complete control over the TOTOLINK A3300R device and execute arbitrary commands.
As a temporary workaround for CVE-2024-27521, it is advisable to restrict access to the device's management interface from untrusted networks.