Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7747

A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument Password results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

View on NVD

Analysis

This vulnerability is a buffer overflow in the login function of a specific Totolink router firmware model. While the flaw allows for remote code execution with a high severity score, this consumer-grade networking hardware is not relevant to the professional software development or server infrastructure managed by the community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0008 (0.1%)
Percentile: 22.7%
EPSS: 2026-05-06

Technical description

A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument Password results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Published: 5/4/2026, 9:16:01 AM
Last modified: 5/4/2026, 3:17:58 PM

References

HomeEventsBlogResourcesTeam