๐Ÿ” CVE Alert

CVE-2026-5105

MEDIUM 6.3

Totolink A3300R Parameter cstecgi.cgi setVpnPassCfg command injection

CVSS Score
6.3
EPSS Score
2.9%
EPSS Percentile
86th

A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

CWE CWE-77 CWE-74
Vendor totolink
Product a3300r
Published Mar 30, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for totolink a3300r

Be the first to know when new medium vulnerabilities affecting totolink a3300r are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Totolink / A3300R
17.0.0cu.557_b20221024

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/354130 vuldb.com: https://vuldb.com/vuln/354130/cti vuldb.com: https://vuldb.com/submit/779143 github.com: https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_pptpPassThru_cmd_inject totolink.net: https://www.totolink.net/

Credits

๐Ÿ” LvHW (VulDB User)