A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_pptpPassThru_cmd_inject | Exploit Third Party Advisory |
| https://vuldb.com/submit/779143 | Permissions Required VDB Entry |
| https://vuldb.com/vuln/354130 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/354130/cti | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
29 Apr 2026, 01:00
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Mar 2026, 15:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:* cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:* |
|
| References | () https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_pptpPassThru_cmd_inject - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/779143 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/vuln/354130 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/354130/cti - Third Party Advisory, VDB Entry | |
| References | () https://www.totolink.net/ - Product | |
| First Time |
Totolink a3300r
Totolink a3300r Firmware Totolink |
30 Mar 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 04:16
Updated : 2026-04-29 01:00
NVD link : CVE-2026-5105
Mitre link : CVE-2026-5105
CVE.ORG link : CVE-2026-5105
JSON object : View
Products Affected
totolink
- a3300r
- a3300r_firmware
