Description
A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub_41A68C of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument setUssd results in command injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Published: 2026-05-01
Score: 8.7 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the function sub_41A68C of the /cgi-bin/cstecgi.cgi script in Totolink NR1800X firmware 9.1.0u.6279_B20210910. Altering the setUssd argument allows an attacker to inject arbitrary operating‑system commands, effectively achieving remote code execution on the router. The flaw permits attackers to compromise the device’s integrity and confidentiality by executing commands with the privileges of the daemon that runs the CGI script, potentially leading to full device takeover.

Affected Systems

Affected systems are Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910. No other firmware releases or products are listed as impacted in the CNA data.

Risk and Exploitability

The CVSS score of 8.7 demonstrates a high severity for this issue. The EPSS score of 1% indicates a low but non‑zero likelihood of exploitation, and the flaw is publicly disclosed and can be exploited remotely via HTTP requests to the web interface, indicating a realistic attack vector for attackers with network access to the router. The vulnerability is not yet listed in the CISA KEV catalog, but its public exploit code raises concern for widespread potential exploitation.

Generated by OpenCVE AI on May 1, 2026 at 23:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware that addresses the command injection flaw
  • If firmware upgrade is not immediately possible, restrict external access to the /cgi-bin/cstecgi.cgi endpoint using firewall rules or ACLs
  • Disable the USSD functionality or otherwise block manipulation of the setUssd parameter via router configuration settings

Generated by OpenCVE AI on May 1, 2026 at 23:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink nr1800x
Vendors & Products Totolink nr1800x

Fri, 01 May 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub_41A68C of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument setUssd results in command injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Title Totolink NR1800X cstecgi.cgi sub_41A68C command injection
First Time appeared Totolink
Totolink nr1800x Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:totolink:nr1800x_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink nr1800x Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Nr1800x Nr1800x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T14:08:41.369Z

Reserved: 2026-04-30T19:01:05.673Z

Link: CVE-2026-7548

cve-icon Vulnrichment

Updated: 2026-05-01T14:08:20.670Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T03:16:01.467

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:00:14Z

Weaknesses