CVE-2026-5178

A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this issue is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument vlanPriLan3 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_vlanPriLan3_cmd_inject Exploit Third Party Advisory
https://vuldb.com/submit/779147 Third Party Advisory VDB Entry
https://vuldb.com/vuln/354246 Third Party Advisory VDB Entry
https://vuldb.com/vuln/354246/cti Permissions Required VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*

History

06 Apr 2026, 15:21

Type Values Removed Values Added
References () https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_vlanPriLan3_cmd_inject - () https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_vlanPriLan3_cmd_inject - Exploit, Third Party Advisory
References () https://vuldb.com/submit/779147 - () https://vuldb.com/submit/779147 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/354246 - () https://vuldb.com/vuln/354246 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/354246/cti - () https://vuldb.com/vuln/354246/cti - Permissions Required, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
First Time Totolink a3300r
Totolink a3300r Firmware
Totolink
CPE cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*

01 Apr 2026, 14:24

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de seguridad ha sido detectada en Totolink A3300R 17.0.0cu.557_b20221024. Afectada por este problema es la función setIptvCfg del archivo /cgi-bin/cstecgi.cgi. La manipulación del argumento vlanPriLan3 conduce a inyección de comandos. La explotación remota del ataque es posible. El exploit ha sido divulgado públicamente y puede ser utilizado.

31 Mar 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 04:16

Updated : 2026-04-29 01:00


NVD link : CVE-2026-5178

Mitre link : CVE-2026-5178

CVE.ORG link : CVE-2026-5178


JSON object : View

Products Affected

totolink

  • a3300r
  • a3300r_firmware
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')