๐Ÿ” CVE Alert

CVE-2026-7718

MEDIUM 6.3

Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

CWE CWE-77 CWE-74
Vendor totolink
Product wa300
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for totolink wa300

Be the first to know when new medium vulnerabilities affecting totolink wa300 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Totolink / WA300
5.2cu.7112_B20190227

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360894 vuldb.com: https://vuldb.com/vuln/360894/cti vuldb.com: https://vuldb.com/submit/807196 lavender-bicycle-a5a.notion.site: https://lavender-bicycle-a5a.notion.site/TOTOLINK-WA300-setWebWlanIdx-34553a41781f800ab40ae0c3d68c78a6?pvs=73 totolink.net: https://www.totolink.net/

Credits

๐Ÿ” wxhwxhwxh_mie (VulDB User)