Description
A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: 2.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is a command injection vulnerability in the Totolink WA300 router firmware version 5.2cu.7112_B20190227. An attacker can send a crafted value for the webWlanIdx parameter to the /cgi-bin/cstecgi.cgi POST endpoint, which is then executed by the operating system. The culprit is a lack of proper input sanitisation (CWE‑74) combined with the use of the argument in a shell context (CWE‑77). Based on the description, it is inferred that an attacker can execute arbitrary OS commands, potentially giving them full control over the device.

Affected Systems

The affected product is the Totolink WA300 router running firmware 5.2cu.7112_B20190227. No other firmware releases are identified as vulnerable.

Risk and Exploitability

The CVSS score of 5.3 classifies the risk as moderate, yet the exploit is publicly available and can be triggered remotely via an unauthenticated POST request. Because the EPSS score is 2% and the vulnerability is not listed in CISA’s KEV catalog, the exposure largely depends on the router’s network visibility, but the ability to run arbitrary commands suggests a high potential impact once the device is reachable.

Generated by OpenCVE AI on May 4, 2026 at 14:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Totolink firmware that includes a fix for the command‑injection vulnerability in setWebWlanIdx.
  • If an update is not yet available, block external access to /cgi-bin/cstecgi.cgi or restrict POST traffic to trusted internal IP ranges using the router’s firewall.
  • Implement strict input validation and sanitisation for the webWlanIdx parameter, ensuring it accepts only expected numeric values.
  • Monitor system logs for anomalous POST requests to cstecgi.cgi and alert on suspicious activity.

Generated by OpenCVE AI on May 4, 2026 at 14:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 03:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink wa300
Vendors & Products Totolink wa300

Mon, 04 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection
First Time appeared Totolink
Totolink wa300 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink wa300 Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Wa300 Wa300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T00:53:15.330Z

Reserved: 2026-05-03T08:09:26.168Z

Link: CVE-2026-7718

cve-icon Vulnrichment

Updated: 2026-05-05T00:52:22.466Z

cve-icon NVD

Status : Deferred

Published: 2026-05-04T02:15:58.477

Modified: 2026-05-04T15:18:40.077

Link: CVE-2026-7718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T14:45:02Z

Weaknesses