Totolink T8 4.1.5cu.833_20220905 Setting /cgi-bin/cstecgi.cgi getSysStatusCfg ssid/key information disclosure
A vulnerability classified as problematic has been found in Totolink T8 4.1.5cu.833_20220905. This affects the function getSysStatusCfg of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation of the argument ssid/key with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. This is going to have an impact on confidentiality.
The weakness was published 01/16/2024 by Chun-Li Lin with CHT Security Co., Ltd.. The advisory is shared at chtsecurity.com. This vulnerability is uniquely identified as CVE-2024-0569. Technical details and a public exploit are known. MITRE ATT&CK project uses the attack technique T1592 for this issue.
The exploit is shared for download at drive.google.com. It is declared as proof-of-concept.
Upgrading to version 4.1.5cu.862_B20230228 eliminates this vulnerability.
Further details are available at chtsecurity.com.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.8
VulDB Base Score: 4.3
VulDB Temp Score: 3.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.1
NVD Vector: 🔍
CNA Base Score: 4.3
CNA Vector (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| unlock | unlock | unlock | unlock | unlock | unlock |
| unlock | unlock | unlock | unlock | unlock | unlock |
| unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | unlock | unlock | unlock | unlock |
|---|---|---|---|---|
| Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: T8 4.1.5cu.862_B20230228
Timeline
01/16/2024 🔍01/16/2024 🔍
01/16/2024 🔍
06/18/2024 🔍
Sources
Vendor: totolink.netAdvisory: chtsecurity.com
Researcher: Chun-Li Lin
Organization: CHT Security Co., Ltd.
Status: Confirmed
CVE: CVE-2024-0569 (🔍)
GCVE (CVE): GCVE-0-2024-0569
GCVE (VulDB): GCVE-100-250785
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 01/16/2024 08:11Updated: 06/18/2024 16:54
Changes: 01/16/2024 08:11 (45), 02/03/2024 17:17 (2), 02/03/2024 17:24 (28), 04/01/2024 08:45 (4), 05/29/2024 11:09 (1), 05/29/2024 20:01 (1), 06/18/2024 16:54 (22)
Complete: 🔍
Submitter: lin7lic
Committer: lin7lic
Cache ID: 152:AC2:65
Submit
Accepted
- Submit #263653: Totolink T8 V4.1.5cu.833_20220905 Broken Access Control (by lin7lic)
No comments yet. Languages: en.
Please log in to comment.