CVE-2026-5177
Received Received - Intake
Remote Command Injection in Totolink A3300R setWiFiBasicCfg

Publication date: 2026-03-31

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this vulnerability is the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument rxRate can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a3300r_firmware 17.0.0cu.557_b20221024
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-5177 vulnerability allows remote attackers to execute arbitrary operating system commands on the affected Totolink A3300R router. This type of command injection flaw can lead to unauthorized access, data breaches, or manipulation of sensitive information.

Such security weaknesses can impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches. Exploitation of this vulnerability could result in exposure or compromise of protected data, thereby violating these regulations.

However, the provided information does not explicitly state the direct compliance impact or specific regulatory consequences.


Can you explain this vulnerability to me?

CVE-2026-5177 is a command injection vulnerability in the TOTOLINK A3300R router, version 17.0.0cu.557_b20221024. It exists in the function that processes the "rxRate" parameter within the router's embedded HTTP server. An attacker can send a specially crafted HTTP POST request to the router's CGI endpoint with malicious commands embedded in the "rxRate" parameter. These commands are executed by the router's operating system, allowing the attacker to run arbitrary OS commands remotely.

Specifically, the vulnerability arises because the "rxRate" parameter is formatted into a buffer and then executed via a system call without proper sanitization, enabling remote command execution.


How can this vulnerability impact me? :

This vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected TOTOLINK A3300R router. This can lead to unauthorized control over the device, including downloading and executing malicious files, altering device configurations, or using the device as a foothold for further attacks within the network.

Such control can compromise the confidentiality, integrity, and availability of the network and connected devices, potentially leading to data breaches, network disruptions, or further exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted HTTP POST request to the router's CGI endpoint (/cgi-bin/cstecgi.cgi) with the "rxRate" parameter containing a test command. If the device executes the command, it is vulnerable.

For example, you can use curl to send a POST request with JSON data including the "rxRate" parameter set to a harmless command like `id` or `echo test` enclosed in backticks to check for command execution.

  • curl -X POST http://<router-ip>/cgi-bin/cstecgi.cgi -d '{"rxRate":"`id`"}' -H "Content-Type: application/json"
  • curl -X POST http://<router-ip>/cgi-bin/cstecgi.cgi -d '{"rxRate":"`echo test`"}' -H "Content-Type: application/json"

If the response or router behavior indicates that the command was executed (e.g., output of the id command or side effects of the echo command), the device is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the affected router's management interface to trusted networks only, such as local LAN, and disabling remote management if enabled.

Avoid sending untrusted input to the vulnerable endpoint (/cgi-bin/cstecgi.cgi) and monitor network traffic for suspicious POST requests containing the "rxRate" parameter.

If possible, update the router firmware to a version that patches this vulnerability or contact the vendor for a security update.

As a temporary workaround, consider firewall rules to block external access to the router's HTTP management interface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart