Description
A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-01-06
Score: 5.3 Medium
EPSS: 1.9% Low
KEV: No
Impact: Remote Command Execution
Action: Assess Impact
AI Analysis

Impact

The vulnerability exists in the WA300’s cstecgi.cgi script, where the UPLOAD_FILENAME argument is not properly validated in the sub_401510 function. A maliciously crafted value can be used to inject arbitrary OS commands that are executed by the device’s shell. This can compromise the confidentiality, integrity, and availability of the router as the attacker could run commands with the privileges of the web service process.

Affected Systems

The issue affects TOTOLINK WA300 routers running firmware 5.2cu.7112_B20190227. Only the cstecgi.cgi component part of the web‑management interface is involved. No other firmware versions or products are listed as impacted.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate severity, while an EPSS of 2 % suggests a low‑to‑moderate likelihood of exploitation. The vulnerability can be triggered remotely by sending a crafted HTTP request to the router’s management interface; the description does not specify whether authentication is required. It is not listed in the CISA KEV catalog, but publicly disclosed proof‑of‑concept code demonstrates that attackers could use this flaw against exposed devices. The likely attack vector is a remote HTTP request with a malicious UPLOAD_FILENAME parameter.

Generated by OpenCVE AI on April 18, 2026 at 20:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to any firmware version that contains the patched cstecgi.cgi component once it becomes available from TOTOLINK.
  • Limit or block external access to the router’s web‑management interface, confining traffic to trusted internal networks or configuring the firewall to deny inbound connections to the relevant ports.
  • Monitor inbound traffic to the /cgi-bin/cstecgi.cgi path for malformed or suspicious requests, and investigate any anomalies promptly.

Generated by OpenCVE AI on April 18, 2026 at 20:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:*

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink wa300 Firmware
CPEs cpe:2.3:h:totolink:wa300:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:wa300_firmware:5.2cu.7112_b20190227:*:*:*:*:*:*:*
Vendors & Products Totolink wa300 Firmware

Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink wa300
Vendors & Products Totolink
Totolink wa300

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title TOTOLINK WA300 cstecgi.cgi sub_401510 command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Wa300 Wa300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:21:20.676Z

Reserved: 2026-01-06T13:52:52.328Z

Link: CVE-2026-0641

cve-icon Vulnrichment

Updated: 2026-01-06T19:20:30.244Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-06T19:16:07.573

Modified: 2026-01-22T17:32:10.363

Link: CVE-2026-0641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses