Submit #792651: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionA command injection vulnerability exists in /cgi-bin/cstecgi.cgi when handling topicurl=setTr069Cfg. The user-controlled parameter stunPort is passed into the backend configuration path (Uci_Set_Str), then concatenated into a command string and executed by CsteSystem/execv without proper sanitization. An authenticated attacker can inject shell metacharacters (e.g., command substitution) to achieve arbitrary command execution on the router.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-port-cmd-injection
User
 m202572177 (UID 95972)
Submission03/30/2026 05:13 (9 days ago)
Moderation04/06/2026 11:45 (7 days later)
StatusDuplicate
VulDB entry250461 [Totolink A3300R 17.0.0cu.557_B20221024 setTr069Cfg pass command injection]
Points0

Interested in the pricing of exploits?

See the underground prices here!