Submit #792646: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionIn TR-069 configuration handler (topicurl=setTr069Cfg), stunEnable is processed by /cgi-bin/cstecgi.cgi and forwarded to command execution components without strict sanitization. Malicious payloads can inject shell commands and trigger arbitrary execution.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-enable-cmd-injection
User
 Manner814 (UID 95971)
Submission03/30/2026 05:06 (13 days ago)
Moderation04/06/2026 11:44 (7 days later)
StatusDuplicate
VulDB entry250461 [Totolink A3300R 17.0.0cu.557_B20221024 setTr069Cfg pass command injection]
Points0