Skip to content
CVSS 8.8 · HIGH

CVE-2026-7717

A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument File can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

Ver en NVD

Análisis

This is a buffer overflow vulnerability in the Totolink WA300 router firmware that allows remote code execution via a POST request. The affected product is obscure consumer networking hardware that is not relevant to the MexicoDev community's focus on software development and server operations.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 22.6%
EPSS: 2026-05-06

Descripción técnica

A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument File can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

Publicada: 4/5/2026, 1:16:05
Última modificación: 4/5/2026, 15:18:40

Referencias

InicioEventosBlogRecursosEquipo