Description
A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-01-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution via HTTP POST
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the setWanCfg command of the /cgi-bin/cstecgi.cgi script on the Totolink NR1800X router. By manipulating the Hostname argument in a POST request, an attacker can inject arbitrary commands, enabling remote code execution. This flaw is a classic command injection described by CWE‑74 and CWE‑77 and allows a threat actor to gain full control over the device's operating system.

Affected Systems

The flaw affects Totolink NR1800X routers running firmware 9.1.0u.6279_B20210910. No other firmware versions or product variants are listed as affected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, but the EPSS score below 1% suggests a very low likelihood of widespread exploitation at this time. The vulnerability is not yet listed in the CISA KEV catalog, though it has been publicly demonstrated. Attackers can exploit this remotely by sending a crafted POST request to /cgi-bin/cstecgi.cgi; it is inferred that the attacker can do this from an external network that has reachability to the router's management interface. In the absence of mitigations, successful injection would grant full administrative access to the device's shell.

Generated by OpenCVE AI on April 18, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Totolink, which removes the command injection error in setWanCfg.
  • If a firmware update is not soon available, block or restrict external POST traffic to /cgi-bin/cstecgi.cgi using firewall rules that limit access to trusted local networks only.
  • Apply stringent input validation on the Hostname parameter, ensuring that only expected alphanumeric characters and allowed punctuation are accepted, effectively preventing command injection attempts.

Generated by OpenCVE AI on April 18, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:totolink:nr1800x_firmware:*:*:*:*:*:*:*:*

Thu, 29 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink nr1800x Firmware
CPEs cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*
Vendors & Products Totolink nr1800x Firmware

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink nr1800x
Vendors & Products Totolink
Totolink nr1800x

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink NR1800X POST Request cstecgi.cgi setWanCfg command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Nr1800x Nr1800x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:52:44.721Z

Reserved: 2026-01-22T07:43:42.391Z

Link: CVE-2026-1326

cve-icon Vulnrichment

Updated: 2026-01-22T20:18:49.204Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T15:16:50.790

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:30:03Z

Weaknesses