Skip to content
CVSS 7.2 · HIGH

CVE-2026-7218

A vulnerability was detected in Totolink N300RT 3.4.0-B20250430. The impacted element is the function is_cmd_string_valid of the file /boafrm/formWsc of the component libapmib.so. Performing a manipulation of the argument localPin results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

Ver en NVD

Análisis

This is a vulnerability in a specific model of consumer-grade router (Totolink N300RT). Consumer IoT and vendor-specific firmware bugs for home networking equipment do not align with the professional interests of web and backend developers or Linux server administrators.

Severidad

Puntaje: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0009 (0.1%)
Percentil: 25.7%
EPSS: 2026-05-06

Descripción técnica

A vulnerability was detected in Totolink N300RT 3.4.0-B20250430. The impacted element is the function is_cmd_string_valid of the file /boafrm/formWsc of the component libapmib.so. Performing a manipulation of the argument localPin results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

Publicada: 28/4/2026, 3:16:04
Última modificación: 28/4/2026, 20:24:58

Referencias

InicioEventosBlogRecursosEquipo