ID

VAR-202401-2215


CVE

CVE-2024-24327


TITLE

TOTOLINK  of  a3300r  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2024-002120

DESCRIPTION

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function. TOTOLINK of a3300r The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A3300R is a wireless router made by China Zeon Electronics (TOTOLINK) Company. This vulnerability is caused by the pppoePass parameter of the setIpv6Cfg method failing to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution

Trust: 2.16

sources: NVD: CVE-2024-24327 // JVNDB: JVNDB-2024-002120 // CNVD: CNVD-2024-09295

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-09295

AFFECTED PRODUCTS

vendor:totolinkmodel:a3300rscope:eqversion:17.0.0cu.557_b20221024

Trust: 1.0

vendor:totolinkmodel:a3300rscope:eqversion:a3300r firmware 17.0.0cu.557 b20221024

Trust: 0.8

vendor:totolinkmodel:a3300rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a3300rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a3300r v17.0.0cu.557 b20221024scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-09295 // JVNDB: JVNDB-2024-002120 // NVD: CVE-2024-24327

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-24327
value: CRITICAL

Trust: 1.0

NVD: CVE-2024-24327
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-09295
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-09295
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-24327
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-24327
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-09295 // JVNDB: JVNDB-2024-002120 // NVD: CVE-2024-24327

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-002120 // NVD: CVE-2024-24327

PATCH

title:Patch for TOTOLINK A3300R setIpv6Cfg method command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/526031

Trust: 0.6

sources: CNVD: CNVD-2024-09295

EXTERNAL IDS

db:NVDid:CVE-2024-24327

Trust: 3.2

db:JVNDBid:JVNDB-2024-002120

Trust: 0.8

db:CNVDid:CNVD-2024-09295

Trust: 0.6

sources: CNVD: CNVD-2024-09295 // JVNDB: JVNDB-2024-002120 // NVD: CVE-2024-24327

REFERENCES

url:https://github.com/funny-mud-peee/iot-vuls/blob/main/totolink%20a3300r/7/totolink%20a3300r%20setipv6cfg.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2024-24327

Trust: 0.8

sources: CNVD: CNVD-2024-09295 // JVNDB: JVNDB-2024-002120 // NVD: CVE-2024-24327

SOURCES

db:CNVDid:CNVD-2024-09295
db:JVNDBid:JVNDB-2024-002120
db:NVDid:CVE-2024-24327

LAST UPDATE DATE

2024-08-14T14:42:48.189000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-09295date:2024-02-21T00:00:00
db:JVNDBid:JVNDB-2024-002120date:2024-02-07T06:48:00
db:NVDid:CVE-2024-24327date:2024-02-01T04:49:22.830

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-09295date:2024-02-08T00:00:00
db:JVNDBid:JVNDB-2024-002120date:2024-02-07T00:00:00
db:NVDid:CVE-2024-24327date:2024-01-30T15:15:09.430