A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/JXBbozaihuang/vuln-research/issues/2 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.349642 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349642 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.765681 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-08 01:15
Updated : 2026-03-10 18:57
NVD link : CVE-2026-3696
Mitre link : CVE-2026-3696
CVE.ORG link : CVE-2026-3696
JSON object : View
Products Affected
totolink
- n300rh_firmware
- n300rh
