Description
A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2024-09-19
Score: 5.3 Medium
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-49655 A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01096}

epss

{'score': 0.02135}


Tue, 24 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink t10 Firmware
CPEs cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
Vendors & Products Totolink t10 Firmware

Thu, 19 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink t10
CPEs cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink t10
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TOTOLINK T10 cstecgi.cgi setTracerouteCfg os command injection
Weaknesses CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Totolink T10 T10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-09-19T20:11:23.091Z

Reserved: 2024-09-19T14:21:55.995Z

Link: CVE-2024-9001

cve-icon Vulnrichment

Updated: 2024-09-19T20:11:18.880Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-19T20:15:07.810

Modified: 2024-09-24T16:14:30.190

Link: CVE-2024-9001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses