No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink wa300
|
|
| Vendors & Products |
Totolink wa300
|
Mon, 04 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument webWlanIdx leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. | |
| Title | Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection | |
| First Time appeared |
Totolink
Totolink wa300 Firmware |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink wa300 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T01:15:17.037Z
Reserved: 2026-05-03T08:09:26.168Z
Link: CVE-2026-7718
No data.
Status : Received
Published: 2026-05-04T02:15:58.477
Modified: 2026-05-04T02:15:58.477
Link: CVE-2026-7718
No data.
OpenCVE Enrichment
Updated: 2026-05-04T03:30:35Z