Skip to content
CVSS 8.8 · HIGH

CVE-2026-7749

A security vulnerability has been detected in Totolink N300RH 3.2.4-B20220812. This affects the function setWanConfig of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument priDns leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

Ver en NVD

Análisis

This is a buffer overflow vulnerability in the firmware of a specific Totolink router model. This falls under the category of vendor-specific IoT hardware firmware that is not widely used in the professional software development or server administration stack for this community.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 22.6%
EPSS: 2026-05-06

Descripción técnica

A security vulnerability has been detected in Totolink N300RH 3.2.4-B20220812. This affects the function setWanConfig of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument priDns leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

Publicada: 4/5/2026, 10:16:01
Última modificación: 4/5/2026, 15:17:58

Referencias

InicioEventosBlogRecursosEquipo