A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/JXBbozaihuang/vuln-research/issues/2 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.349642 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349642 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.765681 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Mar 2026, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Totolink n300rh Firmware
Totolink n300rh Totolink |
|
| CPE | cpe:2.3:o:totolink:n300rh_firmware:6.1c.1353_b20190305:*:*:*:*:*:*:* cpe:2.3:h:totolink:n300rh:4.0:*:*:*:*:*:*:* |
|
| Summary |
|
|
| References | () https://github.com/JXBbozaihuang/vuln-research/issues/2 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.349642 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.349642 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.765681 - Third Party Advisory, VDB Entry | |
| References | () https://www.totolink.net/ - Product |
08 Mar 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-08 01:15
Updated : 2026-03-10 18:57
NVD link : CVE-2026-3696
Mitre link : CVE-2026-3696
CVE.ORG link : CVE-2026-3696
JSON object : View
Products Affected
totolink
- n300rh_firmware
- n300rh
