CVE-2026-1149: Command Injection in Totolink LR350
CVE-2026-1149 is a medium-severity command injection vulnerability in the Totolink LR350 router firmware version 9. 3. 5u. 6369_B20220309. It affects the setDiagnosisCfg function in the /cgi-bin/cstecgi. cgi POST request handler, where manipulation of the 'ip' argument allows remote attackers to execute arbitrary commands. Exploitation does not require user interaction or authentication, increasing its risk. Although no known exploits are currently active in the wild, a public exploit is available. This vulnerability can compromise the confidentiality, integrity, and availability of affected devices, potentially allowing attackers to take full control of the router. European organizations using this router model should prioritize patching or mitigating this issue to prevent unauthorized access and network compromise.
AI Analysis
Technical Summary
CVE-2026-1149 is a command injection vulnerability discovered in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The flaw resides in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi POST request handler. Specifically, the vulnerability arises from improper sanitization of the 'ip' parameter, which an attacker can manipulate to inject arbitrary shell commands. Because the vulnerable endpoint is accessible remotely and does not require authentication or user interaction, an attacker can exploit this vulnerability over the network without prior access. Successful exploitation allows execution of arbitrary commands with the privileges of the web server process, which often runs with elevated rights on embedded devices like routers. This can lead to full device compromise, enabling attackers to alter configurations, intercept or redirect traffic, or pivot into internal networks. The CVSS v4.0 score is 5.3 (medium severity), reflecting the ease of exploitation but limited scope due to the specific affected firmware version. No patches or official fixes are currently linked, and while no active exploits have been observed in the wild, a public exploit is available, increasing the risk of future attacks. The vulnerability highlights the importance of input validation in embedded device web interfaces and the risks posed by exposed management endpoints.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on Totolink LR350 routers in their network infrastructure. Exploitation could lead to unauthorized control over network gateways, allowing attackers to intercept sensitive data, disrupt network availability, or launch further attacks within the internal network. This is particularly critical for organizations handling sensitive personal data under GDPR, as a breach could result in regulatory penalties and reputational damage. Industrial, governmental, and critical infrastructure sectors using these devices may face operational disruptions or espionage risks. The remote, unauthenticated nature of the exploit increases the likelihood of automated scanning and exploitation attempts, potentially impacting a broad range of organizations. Additionally, compromised routers could be recruited into botnets, amplifying threats to wider internet stability and security.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement compensating controls. These include restricting remote access to the router’s management interface via firewall rules or VPNs, disabling unnecessary remote management features, and isolating affected devices on segmented networks to limit lateral movement. Network monitoring should be enhanced to detect unusual command execution patterns or unexpected outbound connections from routers. Organizations should also consider replacing vulnerable devices with updated models or firmware versions once available. Regularly auditing device configurations and applying vendor security advisories promptly is critical. Additionally, deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can help detect and block exploitation attempts. Finally, educating IT staff about this vulnerability and ensuring incident response plans include steps for compromised network devices will improve preparedness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2026-1149: Command Injection in Totolink LR350
Description
CVE-2026-1149 is a medium-severity command injection vulnerability in the Totolink LR350 router firmware version 9. 3. 5u. 6369_B20220309. It affects the setDiagnosisCfg function in the /cgi-bin/cstecgi. cgi POST request handler, where manipulation of the 'ip' argument allows remote attackers to execute arbitrary commands. Exploitation does not require user interaction or authentication, increasing its risk. Although no known exploits are currently active in the wild, a public exploit is available. This vulnerability can compromise the confidentiality, integrity, and availability of affected devices, potentially allowing attackers to take full control of the router. European organizations using this router model should prioritize patching or mitigating this issue to prevent unauthorized access and network compromise.
AI-Powered Analysis
Technical Analysis
CVE-2026-1149 is a command injection vulnerability discovered in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The flaw resides in the setDiagnosisCfg function within the /cgi-bin/cstecgi.cgi POST request handler. Specifically, the vulnerability arises from improper sanitization of the 'ip' parameter, which an attacker can manipulate to inject arbitrary shell commands. Because the vulnerable endpoint is accessible remotely and does not require authentication or user interaction, an attacker can exploit this vulnerability over the network without prior access. Successful exploitation allows execution of arbitrary commands with the privileges of the web server process, which often runs with elevated rights on embedded devices like routers. This can lead to full device compromise, enabling attackers to alter configurations, intercept or redirect traffic, or pivot into internal networks. The CVSS v4.0 score is 5.3 (medium severity), reflecting the ease of exploitation but limited scope due to the specific affected firmware version. No patches or official fixes are currently linked, and while no active exploits have been observed in the wild, a public exploit is available, increasing the risk of future attacks. The vulnerability highlights the importance of input validation in embedded device web interfaces and the risks posed by exposed management endpoints.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on Totolink LR350 routers in their network infrastructure. Exploitation could lead to unauthorized control over network gateways, allowing attackers to intercept sensitive data, disrupt network availability, or launch further attacks within the internal network. This is particularly critical for organizations handling sensitive personal data under GDPR, as a breach could result in regulatory penalties and reputational damage. Industrial, governmental, and critical infrastructure sectors using these devices may face operational disruptions or espionage risks. The remote, unauthenticated nature of the exploit increases the likelihood of automated scanning and exploitation attempts, potentially impacting a broad range of organizations. Additionally, compromised routers could be recruited into botnets, amplifying threats to wider internet stability and security.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement compensating controls. These include restricting remote access to the router’s management interface via firewall rules or VPNs, disabling unnecessary remote management features, and isolating affected devices on segmented networks to limit lateral movement. Network monitoring should be enhanced to detect unusual command execution patterns or unexpected outbound connections from routers. Organizations should also consider replacing vulnerable devices with updated models or firmware versions once available. Regularly auditing device configurations and applying vendor security advisories promptly is critical. Additionally, deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can help detect and block exploitation attempts. Finally, educating IT staff about this vulnerability and ensuring incident response plans include steps for compromised network devices will improve preparedness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T13:55:26.431Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e06e5d302b072d9adddaf
Added to database: 1/19/2026, 10:26:45 AM
Last enriched: 1/19/2026, 10:41:10 AM
Last updated: 1/19/2026, 11:41:26 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1151: Cross Site Scripting in technical-laohu mpay
MediumCVE-2026-1150: Command Injection in Totolink LR350
Medium42,000 Impacted by Ingram Micro Ransomware Attack
MediumCVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.