Description
A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.
Problem types
Product status
Timeline
| 2026-02-07: | Advisory disclosed |
| 2026-02-07: | VulDB entry created |
| 2026-02-12: | VulDB entry last update |
Credits
jiefengliang (VulDB User)
References
vuldb.com/?id.344869 (VDB-344869 | Totolink WA300 cstecgi.cgi setAPNetwork os command injection)
vuldb.com/?ctiid.344869 (VDB-344869 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.752063 (Submit #752063 | TOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection)
github.com/master-abc/cve/issues/36
www.totolink.net/