Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink n300rh
|
|
| Vendors & Products |
Totolink n300rh
|
Mon, 04 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. | |
| Title | Totolink N300RH POST Request cstecgi.cgi setUpgradeFW buffer overflow | |
| First Time appeared |
Totolink
Totolink n300rh Firmware |
|
| Weaknesses | CWE-119 CWE-120 |
|
| CPEs | cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink n300rh Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T10:32:32.518Z
Reserved: 2026-05-03T17:20:47.974Z
Link: CVE-2026-7748
Updated: 2026-05-04T10:29:12.110Z
Status : Deferred
Published: 2026-05-04T10:16:00.850
Modified: 2026-05-04T15:17:58.710
Link: CVE-2026-7748
No data.
OpenCVE Enrichment
Updated: 2026-05-04T11:00:12Z