Vulnerabilities (CVE)

Filtered by vendor Totolink Subscribe
Total 1069 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-26731 1 Totolink 2 A3002ru-v2, A3002ru Firmware 2026-03-16 N/A 8.8 HIGH
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the routernamer`parameter in the formDnsv6 function.
CVE-2026-26732 1 Totolink 2 A3002ru-v2, A3002ru Firmware 2026-03-11 N/A 8.8 HIGH
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.
CVE-2026-3696 1 Totolink 2 N300rh, N300rh Firmware 2026-03-10 7.5 HIGH 7.3 HIGH
A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
CVE-2026-26736 1 Totolink 2 A3002ru-v3, A3002ru Firmware 2026-03-09 N/A 8.8 HIGH
TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.
CVE-2025-67445 1 Totolink 2 X5000r, X5000r Firmware 2026-02-27 N/A 7.5 HIGH
TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a denial-of-service vulnerability in /cgi-bin/cstecgi.cgi. The CGI reads the CONTENT_LENGTH environment variable and allocates memory using malloc (CONTENT_LENGTH + 1) without sufficient bounds checking. When lighttpd s request size limit is not enforced, a crafted large POST request can cause memory exhaustion or a segmentation fault, leading to a crash of the management CGI and loss of availability of the web interface.
CVE-2026-3301 1 Totolink 2 N300rh, N300rh Firmware 2026-02-27 10.0 HIGH 9.8 CRITICAL
A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Management Interface. Performing a manipulation of the argument webWlanIdx results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
CVE-2025-70328 1 Totolink 2 X6000r, X6000r Firmware 2026-02-26 N/A 8.8 HIGH
TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable. The host_time parameter is retrieved via sub_40C404 and passed to a date -s shell command through CsteSystem. While the first two tokens of the input are validated, the remainder of the string is not sanitized, allowing authenticated attackers to execute arbitrary shell commands via shell metacharacters.
CVE-2025-70327 1 Totolink 2 X5000r, X5000r Firmware 2026-02-26 N/A 9.8 CRITICAL
TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution.
CVE-2025-70329 1 Totolink 2 X5000r, X5000r Firmware 2026-02-24 N/A 8.0 HIGH
TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to the CsteSystem function without adequate validation or filtering. This allows an authenticated attacker to execute arbitrary shell commands with root privileges by injecting shell metacharacters into the affected parameters.
CVE-2026-2167 1 Totolink 2 Wa300, Wa300 Firmware 2026-02-11 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.
CVE-2026-1601 1 Totolink 2 A7000r, A7000r Firmware 2026-02-10 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-1623 1 Totolink 2 A7000r, A7000r Firmware 2026-02-10 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in Totolink A7000R 4.1cu.4154. Impacted is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument FileName causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-1686 1 Totolink 2 A3600r, A3600r Firmware 2026-02-10 9.0 HIGH 8.8 HIGH
A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
CVE-2025-67186 1 Totolink 2 A950rg, A950rg Firmware 2026-02-10 N/A 9.8 CRITICAL
TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilterRules interface of /lib/cste_modules/firewall.so. The vulnerability occurs because the `url` parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
CVE-2025-67188 1 Totolink 2 A950rg, A950rg Firmware 2026-02-10 N/A 9.8 CRITICAL
A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue resides in the setRadvdCfg interface of the /lib/cste_modules/ipv6.so module. The function fails to properly validate the length of the user-controlled radvdinterfacename parameter, allowing remote attackers to trigger a stack buffer overflow.
CVE-2025-67189 1 Totolink 2 A950rg, A950rg Firmware 2026-02-10 N/A 6.5 MEDIUM
A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2cu.5204_B20210112. The urlKeyword parameter is not properly validated, and the function concatenates multiple user-controlled fields into a fixed-size stack buffer without performing boundary checks. A remote attacker can exploit this flaw to cause denial of service or potentially achieve arbitrary code execution.
CVE-2025-67187 1 Totolink 2 A950rg, A950rg Firmware 2026-02-10 N/A 9.8 CRITICAL
A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The flaw exists in the setIpQosRules interface of /lib/cste_modules/firewall.so where the comment parameter is not properly validated for length.
CVE-2026-1547 1 Totolink 2 A7000r, A7000r Firmware 2026-02-09 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVE-2026-1548 1 Totolink 2 A7000r, A7000r Firmware 2026-02-09 6.5 MEDIUM 6.3 MEDIUM
A flaw has been found in Totolink A7000R 4.1cu.4154. This impacts the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument url causes command injection. The attack can be initiated remotely. The exploit has been published and may be used.
CVE-2026-0731 1 Totolink 2 Wa1200-poe, Wa1200-poe Firmware 2026-01-29 5.0 MEDIUM 5.3 MEDIUM
A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.