Home

Description

A vulnerability was detected in Totolink N300RT 3.4.0-B20250430. The impacted element is the function is_cmd_string_valid of the file /boafrm/formWsc of the component libapmib.so. Performing a manipulation of the argument localPin results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

PUBLISHED Reserved 2026-04-27 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulDB




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 7.2CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
8.3AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

3.4.0-B20250430
affected

Timeline

2026-04-27:Advisory disclosed
2026-04-27:VulDB entry created
2026-04-27:VulDB entry last update

Credits

xyhackr (VulDB User) reporter

References

vuldb.com/vuln/359818 (VDB-359818 | Totolink N300RT libapmib.so formWsc is_cmd_string_valid buffer overflow) vdb-entry technical-description

vuldb.com/vuln/359818/cti (VDB-359818 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/802127 (Submit #802127 | Totolink N300RT Router V3.4.0-B20250430 Buffer Overflow) third-party-advisory

github.com/xiaohaiyang-ai/TOTOLINK-N300RT-Buffer-Overflow exploit

www.totolink.net/ product

cve.org (CVE-2026-7218)

nvd.nist.gov (CVE-2026-7218)

Download JSON