Description
A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. Affected by this vulnerability is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid results in buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-01-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The flaw lies in the setWiFiEasyGuestCfg routine of /cgi-bin/cstecgi.cgi, where user-supplied ssid data is copied into a fixed‑size buffer without proper bounds checking. This stack‑based overflow can be triggered by a specially crafted ssid value sent from a remote host, and the publicly available exploit demonstrates that an attacker can potentially execute arbitrary code or crash the device, leading to loss of confidentiality, integrity or availability.

Affected Systems

The vulnerability affects Totolink LR350 routers operating with firmware 9.3.5u.6369_B20220309. No other vendors or product variants are listed in the available data.

Risk and Exploitability

With a CVSS score of 8.7 the flaw is high severity, and the EPSS score of less than 1% suggests that exploitation is not yet widespread. The vulnerability is not currently catalogued in the CISA KEV list, but the public exploit code indicates that a remote attacker can target the /cgi-bin/cstecgi.cgi endpoint to trigger the overflow and potentially gain remote code execution on the device.

Generated by OpenCVE AI on April 18, 2026 at 20:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest Totolink firmware that addresses the setWiFiEasyGuestCfg buffer overflow.
  • If a patch is not yet available, block remote access to the admin interface and prevent external use of the /cgi-bin/cstecgi.cgi endpoint by disabling or restricting the URL at the web server or firewall level.
  • Deploy firewall rules to rate‑limit or filter traffic destined for the /cgi-bin/cstecgi.cgi path and monitor device logs for abnormal ssid parameter activity.

Generated by OpenCVE AI on April 18, 2026 at 20:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:totolink:lr350_firmware:*:*:*:*:*:*:*:*

Thu, 29 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink lr350 Firmware
CPEs cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*
Vendors & Products Totolink lr350 Firmware

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink lr350
Vendors & Products Totolink
Totolink lr350

Mon, 19 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. Affected by this vulnerability is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid results in buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Title Totolink LR350 cstecgi.cgi setWiFiEasyGuestCfg buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Lr350 Lr350 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:46:05.944Z

Reserved: 2026-01-18T20:19:47.760Z

Link: CVE-2026-1155

cve-icon Vulnrichment

Updated: 2026-01-20T21:31:16.246Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T13:16:20.360

Modified: 2026-01-29T18:39:38.087

Link: CVE-2026-1155

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses