CVE-2026-5679
Totolink A3300R cstecgi.cgi vsetTr069Cfg os command injection
CVSS Score
5.5
EPSS Score
0.9%
EPSS Percentile
75th
A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_B20221024. The impacted element is the function vsetTr069Cfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument stun_pass leads to os command injection. The exploit has been disclosed publicly and may be used.
| CWE | CWE-78 CWE-77 |
| Vendor | totolink |
| Product | a3300r |
| Published | Apr 6, 2026 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for totolink a3300r
Be the first to know when new medium vulnerabilities affecting totolink a3300r are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Totolink / A3300R
17.0.0cu.557_B20221024
References
vuldb.com: https://vuldb.com/vuln/355506 vuldb.com: https://vuldb.com/vuln/355506/cti vuldb.com: https://vuldb.com/submit/792650 vuldb.com: https://vuldb.com/submit/792798 github.com: https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-pass-cmd-injection totolink.net: https://www.totolink.net/
Credits
๐ m202572177 (VulDB User)