Submit #792638: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionIn topicurl=setDdnsCfg, parameter password in /cgi-bin/cstecgi.cgi is unsafely propagated to command execution routines (Uci_Set_Str and CsteSystem). Lack of neutralization of shell metacharacters enables command injection and execution of attacker-supplied commands.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-password-cmd-injection
User
 Svigo_o (UID 95970)
Submission03/30/2026 05:00 (11 days ago)
Moderation04/06/2026 11:43 (7 days later)
StatusDuplicate
VulDB entry250462 [Totolink A3300R 17.0.0cu.557_B20221024 setDdnsCfg Username command injection]
Points0

Want to know what is going to be exploited?

We predict KEV entries!