Description
A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-29
Score: 5.3 Medium
EPSS: 1.9% Low
KEV: No
Impact: Remote Code Execution via Telnet Service Command Injection
Action: Immediate Patch
AI Analysis

Impact

An attacker can exploit an input validation flaw in the NTPSyncWithHost feature of the /cgi-bin/cstecgi.cgi script, sending a crafted host_time argument that is directly executed as a command on the device. This results in the ability to run arbitrary shell commands, giving the attacker full control over the affected router. The weakness is related to command injection vulnerabilities.

Affected Systems

The vulnerability affects the Totolink NR1800X router with firmware version 9.1.0u.6279_B20210910. Only this specific firmware build is known to be susceptible; newer or older revisions may not be impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of 3% suggests a low to moderate likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, but it has been publicly disclosed and a working exploit exists, which means a remote attacker with network access to the Telnet service can trigger the injection. The attack requires enumeration of the Telnet interface and sending crafted requests to the cstecgi.cgi endpoint.

Generated by OpenCVE AI on March 30, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a non‑vulnerable build or apply the vendor-published patch for 9.1.0u.6279_B20210910.
  • If an upgrade is not immediately possible, disable the Telnet service or block its port from external access via firewall rules.
  • Remove or restrict the use of the NTPSyncWithHost feature in router configuration to prevent command execution.
  • Verify that other MSI/Removable services that accept input from /cgi-bin/cstecgi.cgi are also patched or disabled.

Generated by OpenCVE AI on March 30, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*

Mon, 30 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink nr1800x
Vendors & Products Totolink nr1800x

Sun, 29 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Totolink NR1800X Telnet Service cstecgi.cgi NTPSyncWithHost command injection
First Time appeared Totolink
Totolink nr1800x Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:totolink:nr1800x_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink nr1800x Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Nr1800x Nr1800x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T13:28:48.091Z

Reserved: 2026-03-27T15:55:59.708Z

Link: CVE-2026-5030

cve-icon Vulnrichment

Updated: 2026-03-30T13:28:40.967Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T05:15:55.603

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:55Z

Weaknesses