Description
A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-05-04
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow exists in the setUpgradeFW function of the POST Request Handler found in the /cgi-bin/cstecgi.cgi file. Manipulating the FileName argument allows an attacker to overflow an internal buffer, potentially yielding remote code execution. The flaw is a memory corruption problem identified as CWE-119 and involves a stack-based buffer overflow, labeled CWE-120. The vulnerability is not limited to local traffic; the description explicitly states that the attack can be launched remotely and that public exploits are available.

Affected Systems

The vulnerability affects Totolink N300RH routers running firmware version 3.2.4-B20220812. Any device deployed with this specific firmware build is directly exposed.

Risk and Exploitability

The CVSS score of 8.7 assesses the issue as high severity, and because the vulnerability is remotely exploitable with publicly available exploits, it poses a significant risk. The EPSS score is unavailable, and the vulnerability is not currently listed in the CISA KEV catalog, but the lack of mitigation information heightens the potential for exploitation. The attack vector is likely a crafted POST request to the setUpgradeFW endpoint from an external network.

Generated by OpenCVE AI on May 4, 2026 at 10:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that addresses the buffer overflow
  • Close or restrict remote access to the router’s administrative interfaces, limiting exposure to trusted networks
  • Block or filter POST requests to the /cgi-bin/cstecgi.cgi setUpgradeFW endpoint using a firewall or access control list
  • Continuously monitor router logs for abnormal POST traffic or attempts to invoke the setUpgradeFW function

Generated by OpenCVE AI on May 4, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink n300rh
Vendors & Products Totolink n300rh

Mon, 04 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink N300RH POST Request cstecgi.cgi setUpgradeFW buffer overflow
First Time appeared Totolink
Totolink n300rh Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink n300rh Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink N300rh N300rh Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T10:32:32.518Z

Reserved: 2026-05-03T17:20:47.974Z

Link: CVE-2026-7748

cve-icon Vulnrichment

Updated: 2026-05-04T10:29:12.110Z

cve-icon NVD

Status : Received

Published: 2026-05-04T10:16:00.850

Modified: 2026-05-04T10:16:00.850

Link: CVE-2026-7748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T11:00:12Z

Weaknesses