Submit #792799: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionA command injection vulnerability affects parameter ttlWay in /cgi-bin/cstecgi.cgi for topicurl=setWanCfg. The value is handled by Uci_Set_Str, incorporated into a command string, and executed via CsteSystem/execv with insufficient filtering of shell metacharacters. This allows arbitrary command execution through crafted request input.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-ttl-way-cmd-injection
User
 HustBinary (UID 96916)
Submission03/30/2026 13:29 (9 days ago)
Moderation04/06/2026 12:23 (7 days later)
StatusDuplicate
VulDB entry250459 [Totolink A3300R 17.0.0cu.557_B20221024 setWanCfg Hostname command injection]
Points0

Want to stay up to date on a daily basis?

Enable the mail alert feature now!