Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7719

A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Ver en NVD

Análisis

This is a buffer overflow in the firmware of a specific Totolink router model. While it allows for remote code execution and has a public exploit, the hardware is niche consumer/IoT equipment and not part of the standard software development or server infrastructure used by this community.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 22.7%
EPSS: 2026-05-06

Descripción técnica

A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Publicada: 4/5/2026, 2:15:58
Última modificación: 4/5/2026, 15:18:40

Referencias

InicioEventosBlogRecursosEquipo