Description
A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-03-30
Score: 5.3 Medium
EPSS: 2.9% Low
KEV: No
Impact: Arbitrary Command Execution
Action: Patch
AI Analysis

Impact

A command injection flaw exists in the setVpnPassCfg function of the cstecgi.cgi component on Totolink A3300R routers. By manipulating the pptpPassThru argument, an attacker can inject and execute arbitrary shell commands remotely, which can lead to full compromise of the device's configuration, data, and network connectivity. The weakness is reflected in the CVSS score of 5.3, indicating a moderate level of severity from a security standpoint.

Affected Systems

The affected systems are Totolink A3300R routers running firmware version 17.0.0cu.557_b20221024. No other vendors or product lines are listed as impacted in the CVE data.

Risk and Exploitability

The attack vector is remote, leveraging the router’s web interface or API that accepts the pptpPassThru parameter. An exploit is publicly available, and no official CISA KEV listing is attached, but the public availability of the exploit combined with the absence of a patch raises the risk of abuse. Although the EPSS score is not provided, the remote command execution potential warrants heightened vigilance and timely firmware remediation.

Generated by OpenCVE AI on March 30, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update firmware to the latest version that addresses the setVpnPassCfg command injection issue.
  • If an update is unavailable, disable the PPTP passthrough feature or restrict access to the cstecgi.cgi endpoint.
  • Restrict remote access to the router’s administration interface to trusted network segments.
  • Monitor router logs for anomalous command execution or unexpected network activity.
  • Apply network segmentation or firewall rules to limit exposure of the device to the internet.

Generated by OpenCVE AI on March 30, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*

Mon, 30 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3300r
Vendors & Products Totolink a3300r

Mon, 30 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title Totolink A3300R Parameter cstecgi.cgi setVpnPassCfg command injection
First Time appeared Totolink
Totolink a3300r Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:totolink:a3300r_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3300r Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A3300r A3300r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T13:58:27.213Z

Reserved: 2026-03-29T17:50:56.050Z

Link: CVE-2026-5105

cve-icon Vulnrichment

Updated: 2026-03-30T13:58:21.503Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T04:16:09.680

Modified: 2026-03-30T15:40:01.770

Link: CVE-2026-5105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:03:43Z

Weaknesses