CVE-2026-3696
Received Received - Intake
Remote OS Command Injection in Totolink N300RH CGI Handler

Publication date: 2026-03-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink n300rh_firmware 6.1c.1353_b20190305
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-3696 is a critical OS command injection vulnerability found in the TOTOLINK N300RH V4 router, specifically in firmware version V6.1c.1353_B20190305. The flaw exists in the setWiFiWpsConfig function of the CGI handler component, accessible via the router's web management interface at /cgi-bin/cstecgi.cgi."}, {'type': 'paragraph', 'content': "The vulnerability arises because the function processes user input from the HTTP parameter 'PIN' without any validation or sanitization, embedding it directly into a shell command string that is executed with root privileges. This allows a remote attacker with network access to the router’s web interface to inject arbitrary shell commands."}, {'type': 'paragraph', 'content': 'Exploitation requires no authentication and can be performed remotely, potentially leading to full compromise of the router and control over the connected network.'}] [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability allows a remote attacker to execute arbitrary OS commands on the affected router with root privileges without any authentication.

As a result, the attacker can fully compromise the router, gaining control over its configuration and potentially the entire connected network.

This can lead to loss of confidentiality, integrity, and availability of the device and network resources, enabling further attacks such as data interception, network manipulation, or launching attacks on other connected systems.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by monitoring for suspicious HTTP POST requests to the router's web management interface, specifically targeting the endpoint /cgi-bin/cstecgi.cgi with parameters related to WPS PIN configuration."}, {'type': 'paragraph', 'content': 'A detection method involves checking for HTTP requests containing the parameter "PINPBCRadio" set to "1" and the "PIN" parameter containing suspicious shell metacharacters such as `;`, `|`, `&`, backticks (`), or $().'}, {'type': 'paragraph', 'content': 'Example command to detect such attempts using network traffic capture tools like tcpdump or tshark:'}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -E 'PINPBCRadio=1|PIN=.*[;|&`$()]'"}, {'type': 'paragraph', 'content': 'Alternatively, using curl to test the vulnerability by sending a crafted POST request (for detection or proof-of-concept):'}, {'type': 'list_item', 'content': "curl -X POST http://[router-ip]/cgi-bin/cstecgi.cgi -d 'PINPBCRadio=1&PINMode=&PIN=12345678`id`'"}, {'type': 'paragraph', 'content': 'If the router executes the injected command (e.g., returns output of `id`), it confirms the presence of the vulnerability.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Currently, no known countermeasures or mitigations exist for this vulnerability in the affected firmware version.'}, {'type': 'paragraph', 'content': 'The recommended immediate step is to replace the affected Totolink N300RH router with an alternative device that is not vulnerable.'}, {'type': 'paragraph', 'content': "Additionally, if possible, disable remote management access to the router's web interface to reduce exposure."}, {'type': 'paragraph', 'content': "Monitor network traffic for exploitation attempts and restrict network access to the router's management interface to trusted hosts only."}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart