Description
A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNoticeCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument NoticeUrl results in command injection. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-03-29
Score: 5.3 Medium
EPSS: 1.9% Low
KEV: No
Impact: Command Injection (remote)
Action: Immediate Patch
AI Analysis

Impact

The flaw occurs in the setNoticeCfg endpoint of /cgi-bin/cstecgi.cgi. An attacker can supply a malicious NoticeUrl value that the router forwards directly to the underlying shell, enabling arbitrary command execution. This command injection can compromise the router’s operating system and allow an attacker to take full control, potentially exposing the network it manages.

Affected Systems

The vulnerability is confirmed on Totolink A3600R routers running firmware 4.1.2cu.5182_B20201102. The known affected product is the A3600R model. While the advisory does not list other versions, it is inferred from the description that any firmware build that still uses the unvalidated NoticeUrl parameter in the setNoticeCfg function could be susceptible.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity; the EPSS score of 3% implies low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The likely attack path involves a remote attacker sending a specially crafted HTTP request to the setNoticeCfg endpoint without needing authentication or local privilege. If successful, the attacker could execute arbitrary shell commands on the device.

Generated by OpenCVE AI on March 30, 2026 at 22:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an available firmware update that addresses the command injection flaw in the setNoticeCfg handler.
  • If no update is available, restrict remote access to the /cgi-bin/cstecgi.cgi endpoint or the setNoticeCfg function using a firewall rule or access control list.
  • Monitor device logs for unexpected use of the NoticeUrl parameter or shell command execution indicative of exploitation.
  • Regularly review Totolink support or product website for patches or advisories related to this issue.

Generated by OpenCVE AI on March 30, 2026 at 22:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3600r
Vendors & Products Totolink a3600r

Sun, 29 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNoticeCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument NoticeUrl results in command injection. The attack may be launched remotely. The exploit is now public and may be used.
Title Totolink A3600R Parameter cstecgi.cgi setNoticeCfg command injection
First Time appeared Totolink
Totolink a3600r Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:totolink:a3600r_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3600r Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A3600r A3600r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T14:20:46.528Z

Reserved: 2026-03-27T14:15:43.882Z

Link: CVE-2026-5020

cve-icon Vulnrichment

Updated: 2026-04-01T14:20:41.704Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T01:15:57.133

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5020

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:00:34Z

Weaknesses