Description
A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Problem types
Product status
Timeline
| 2026-05-03: | Advisory disclosed |
| 2026-05-03: | VulDB entry created |
| 2026-05-03: | VulDB entry last update |
Credits
wxhwxhwxh_mie (VulDB User)
References
vuldb.com/vuln/360894 (VDB-360894 | Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection)
vuldb.com/vuln/360894/cti (VDB-360894 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/807196 (Submit #807196 | Totolink WA300 WA300 V5.2cu.7112_B20190227 Command Injection)
lavender-bicycle-a5a.notion.site/...ab40ae0c3d68c78a6?pvs=73
www.totolink.net/