Description
A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-05-04
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Totolink WA300 firmware contains a classic buffer overflow in the loginauth function of the cstecgi.cgi component, triggered by malicious manipulation of the http_host argument in a POST request. This flaw is a stack-based overflow that violates bounds checking, exposing the system to arbitrary code execution and compromising confidentiality, integrity, and availability. The vulnerability is classified under CWE-119 and CWE-120 and is listed with a CVSS score of 9.3.

Affected Systems

Vendors impacted are Totolink devices running the WA300 line, specifically firmware version 5.2cu.7112_B20190227. The flaw resides in the POST Request Handler of /cgi-bin/cstecgi.cgi and may affect all units with this firmware build.

Risk and Exploitability

The high CVSS of 9.3 indicates a severe security risk, and although an EPSS score is not available, the public release of an exploit and its remote launch capability suggest an elevated likelihood of attack. The vulnerability is not listed in CISA’s KEV catalog, but its remote nature and usage of a widely used HTTP header component make it attractive to attackers. The most likely attack vector is a remote attacker crafting an HTTP POST request with a malformed http_host value to trigger the overflow.

Generated by OpenCVE AI on May 4, 2026 at 03:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WA300 firmware to a version that has patched the loginauth buffer overflow or apply any vendor-released security patch.
  • Enforce strict validation of the HTTP_HOST header on the device or, when patching is not possible, block or sanitize this header in the network perimeter to prevent the overflow from being triggered.
  • Implement network segmentation and monitor for anomalous POST traffic to /cgi-bin/cstecgi.cgi to detect or deter exploitation attempts.

Generated by OpenCVE AI on May 4, 2026 at 03:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 03:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink wa300
Vendors & Products Totolink wa300

Mon, 04 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink WA300 POST Request cstecgi.cgi loginauth buffer overflow
First Time appeared Totolink
Totolink wa300 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink wa300 Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Wa300 Wa300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T01:30:16.375Z

Reserved: 2026-05-03T08:09:40.154Z

Link: CVE-2026-7719

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-04T02:15:58.657

Modified: 2026-05-04T15:18:40.077

Link: CVE-2026-7719

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T03:30:35Z

Weaknesses