Description
A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-01-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A null pointer dereference can be triggered by sending specially crafted HTTP requests to the cstecgi.cgi handler in TOTOLINK WA1200 firmware 5.9c.2914. This flaw causes the HTTP service to crash, resulting in a loss of ability to manage or access the router. The weakness is a null dereference (CWE‑476) and poses a denial‑of‑service risk to all users of the device.

Affected Systems

The flaw affects TOTOLINK WA1200 routers running firmware 5.9c.2914. No other vendor or version information is given, and the vulnerability is associated with the device model WA1200‑POE used by TOTOLINK.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity. The EPSS score is inferred to be less than 1 percent, signalling a low likelihood of exploitation at present. The vulnerability has not been included in the CISA KEV catalog. Because the flaw is triggered via an HTTP request, the attack vector is network‑based and the attacker only needs remote access to the web interface of the router.

Generated by OpenCVE AI on April 18, 2026 at 07:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that includes the patch for this flaw, if an official update is available from TOTOLINK.
  • Restrict or block external access to the device’s HTTP service by configuring network firewall rules or placing the router within an isolated LAN segment.
  • Enable verbose logging on the router and routinely review it for crashes or abnormal behavior that may indicate an attempted exploitation.

Generated by OpenCVE AI on April 18, 2026 at 07:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink wa1200-poe
Totolink wa1200-poe Firmware
CPEs cpe:2.3:h:totolink:wa1200-poe:*:*:*:*:*:*:*:*
cpe:2.3:o:totolink:wa1200-poe_firmware:5.9c.2914:*:*:*:*:*:*:*
Vendors & Products Totolink wa1200-poe
Totolink wa1200-poe Firmware

Fri, 09 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink wa1200
Vendors & Products Totolink
Totolink wa1200

Thu, 08 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK WA1200 HTTP Request cstecgi.cgi null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Wa1200 Wa1200-poe Wa1200-poe Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:24:32.636Z

Reserved: 2026-01-08T15:15:42.592Z

Link: CVE-2026-0731

cve-icon Vulnrichment

Updated: 2026-01-09T16:23:22.484Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T23:15:44.117

Modified: 2026-01-29T19:18:06.553

Link: CVE-2026-0731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:45:24Z

Weaknesses