Description
A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-01-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via buffer overflow
Action: Patch Immediately
AI Analysis

Impact

A buffer overflow occurs in the setWizardCfg function of the Totolink NR1800X firmware when the ssid parameter is supplied in a POST request. The vulnerability satisfies CWE-119 and CWE-120, enabling an attacker to corrupt memory and potentially execute arbitrary code. If successfully exploited, an attacker could gain remote control over the device, compromise network traffic, or disrupt service availability.

Affected Systems

The affected device is the Totolink NR1800X router running firmware version 9.1.0u.6279_B20210910. The flaw resides in the cstecgi.cgi component of the POST request handler.

Risk and Exploitability

The CVSS score of 8.7 classifies this as high severity, yet the EPSS score of less than 1% indicates a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but the public exploit is available and can be triggered remotely by sending a crafted POST request to the setWizardCfg endpoint.

Generated by OpenCVE AI on April 18, 2026 at 03:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that resolves the setWizardCfg buffer overflow.
  • If a patch is not yet available, block or restrict remote POST traffic to /cgi-bin/cstecgi.cgi from untrusted networks using a firewall or access‑control list.
  • Disable or isolate the router’s management interfaces that expose the setWizardCfg endpoint, ensuring only trusted local connections can reach it.

Generated by OpenCVE AI on April 18, 2026 at 03:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:totolink:nr1800x_firmware:*:*:*:*:*:*:*:*

Thu, 29 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink nr1800x Firmware
CPEs cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*
Vendors & Products Totolink nr1800x Firmware

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink nr1800x
Vendors & Products Totolink
Totolink nr1800x

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
Title Totolink NR1800X POST Request cstecgi.cgi setWizardCfg buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Nr1800x Nr1800x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:53:16.410Z

Reserved: 2026-01-22T07:43:48.228Z

Link: CVE-2026-1328

cve-icon Vulnrichment

Updated: 2026-01-22T16:14:44.286Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T15:16:51.173

Modified: 2026-01-29T17:47:56.127

Link: CVE-2026-1328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:00:08Z

Weaknesses