| Title | Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injection |
|---|
| Description | provider in topicurl=setDdnsCfg is vulnerable in /cgi-bin/cstecgi.cgi. The parameter is transferred to command execution path (Uci_Set_Str to CsteSystem/execv) without proper validation of shell characters, allowing injected commands to run on the device. |
|---|
| Source | ⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-provider-cmd-injection |
|---|
| User | aimless (UID 89799) |
|---|
| Submission | 03/30/2026 05:02 (12 days ago) |
|---|
| Moderation | 04/06/2026 11:43 (7 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 250462 [Totolink A3300R 17.0.0cu.557_B20221024 setDdnsCfg Username command injection] |
|---|
| Points | 0 |
|---|