CVE-2026-7718
Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
| CWE | CWE-77 CWE-74 |
| Vendor | totolink |
| Product | wa300 |
| Published | May 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for totolink wa300
Be the first to know when new medium vulnerabilities affecting totolink wa300 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Totolink / WA300
5.2cu.7112_B20190227
References
vuldb.com: https://vuldb.com/vuln/360894 vuldb.com: https://vuldb.com/vuln/360894/cti vuldb.com: https://vuldb.com/submit/807196 lavender-bicycle-a5a.notion.site: https://lavender-bicycle-a5a.notion.site/TOTOLINK-WA300-setWebWlanIdx-34553a41781f800ab40ae0c3d68c78a6?pvs=73 totolink.net: https://www.totolink.net/
Credits
๐ wxhwxhwxh_mie (VulDB User)