Description
A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_B20221024. The impacted element is the function vsetTr069Cfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument stun_pass leads to os command injection. The exploit has been disclosed publicly and may be used.
Published: 2026-04-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A function in the router’s firmware, vsetTr069Cfg, processes a parameter named stun_pass. By altering this argument an attacker can insert arbitrary operating‑system commands, leading to remote code execution on the device. Successful exploitation permits full control over the router, threatening the confidentiality, integrity, and availability of the device and any networks it serves.

Affected Systems

The vulnerability affects the Totolink A3300R router running firmware version 17.0.0cu.557_B20221024. The issue resides in the /cgi-bin/cstecgi.cgi endpoint and is specific to that product line.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The flaw exists in a web-accessible CGI script, but the description does not state whether the interface is publicly exposed. Based on the description, it is inferred that if /cgi-bin/cstecgi.cgi can be reached from outside the local network, an attacker could leverage the command injection without additional credentials. The EPSS score is less than 1% and the flaw is not listed in the CISA KEV catalog, suggesting limited widespread exploitation to date. Nevertheless, the potential impact remains significant if the script is externally accessible, allowing an attacker to execute arbitrary OS commands on the device.

Generated by OpenCVE AI on April 22, 2026 at 03:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware release that patches the command‑injection flaw in the vsetTr069Cfg endpoint.
  • If a firmware update is not yet available, block or remove external access to the /cgi-bin/cstecgi.cgi script and disable remote STUN configuration management.
  • Restrict remote management to trusted internal IP ranges or enforce VPN access only.
  • Verify that the STUN password is strong and not set to a known default.
  • Continuously monitor device logs for attempts to invoke the stun_pass parameter or to call the vulnerable CGI script.

Generated by OpenCVE AI on April 22, 2026 at 03:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3300r
Vendors & Products Totolink a3300r

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_B20221024. The impacted element is the function vsetTr069Cfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument stun_pass leads to os command injection. The exploit has been disclosed publicly and may be used.
Title Totolink A3300R cstecgi.cgi vsetTr069Cfg os command injection
First Time appeared Totolink
Totolink a3300r Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a3300r_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3300r Firmware
References
Metrics cvssV2_0

{'score': 5.2, 'vector': 'AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A3300r A3300r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T15:10:20.818Z

Reserved: 2026-04-06T09:45:14.836Z

Link: CVE-2026-5679

cve-icon Vulnrichment

Updated: 2026-04-07T15:06:18.706Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T20:16:28.787

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5679

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T03:45:06Z

Weaknesses