Skip to content
CVSS 8.8 · HIGH

CVE-2026-7748

A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Ver en NVD

Análisis

This vulnerability affects specific firmware for Totolink N300RH routers, which is niche consumer hardware not commonly used in professional development or server infrastructure. While it allows for remote code execution via a buffer overflow, its impact is limited to users of this specific vendor's device and does not affect the broader software development ecosystem.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 22.6%
EPSS: 2026-05-06

Descripción técnica

A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Publicada: 4/5/2026, 10:16:00
Última modificación: 4/5/2026, 15:17:58

Referencias

InicioEventosBlogRecursosEquipo