๐Ÿ” CVE Alert

CVE-2026-7719

CRITICAL 9.8

Totolink WA300 POST Request cstecgi.cgi loginauth buffer overflow

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

CWE CWE-120 CWE-119
Vendor totolink
Product wa300
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for totolink wa300

Be the first to know when new critical vulnerabilities affecting totolink wa300 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Totolink / WA300
5.2cu.7112_B20190227

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360895 vuldb.com: https://vuldb.com/vuln/360895/cti vuldb.com: https://vuldb.com/submit/807197 lavender-bicycle-a5a.notion.site: https://lavender-bicycle-a5a.notion.site/TOTOLINK-WA300-loginAuth-34553a41781f8050b8ffc9e90a103cd5 totolink.net: https://www.totolink.net/

Credits

๐Ÿ” wxhwxhwxh_mie (VulDB User)