Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1157: Buffer Overflow in Totolink LR350

0
High
VulnerabilityCVE-2026-1157cvecve-2026-1157
Published: Mon Jan 19 2026 (01/19/2026, 14:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: LR350

Description

A vulnerability was identified in Totolink LR350 9.3.5u.6369_B20220309. This affects the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ssid leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:15:18 UTC

Technical Analysis

CVE-2026-1157 is a buffer overflow vulnerability discovered in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The flaw exists in the setWiFiEasyCfg function within the /cgi-bin/cstecgi.cgi endpoint, specifically in the handling of the ssid parameter. An attacker can remotely send a specially crafted request to this CGI script, causing a buffer overflow due to insufficient input validation or improper memory handling. This overflow can corrupt memory, potentially allowing arbitrary code execution or denial of service. The vulnerability requires no user interaction and no prior authentication, making it remotely exploitable over the network. The CVSS 4.0 score is 8.7 (high), reflecting the ease of exploitation (network attack vector, low attack complexity), no privileges required, and the high impact on confidentiality, integrity, and availability. Although no active exploitation in the wild has been reported, a public exploit is available, increasing the urgency for mitigation. The vulnerability affects a specific firmware version, so other versions may not be vulnerable. The lack of vendor patches at the time of disclosure necessitates interim defensive measures. This vulnerability poses a significant risk to networks using the Totolink LR350 router, especially in environments where these devices are exposed to untrusted networks or the internet.

Potential Impact

The impact of CVE-2026-1157 is significant for organizations using the affected Totolink LR350 firmware. Successful exploitation can lead to arbitrary code execution on the router with elevated privileges, allowing attackers to take full control of the device. This can result in interception or manipulation of network traffic, deployment of persistent backdoors, disruption of network availability, and pivoting to internal networks for further compromise. Confidentiality of sensitive data passing through the router can be compromised, and integrity of network configurations can be altered maliciously. The availability of the network can also be impacted if the device is crashed or rebooted by the exploit. Since the vulnerability requires no authentication and no user interaction, it can be exploited by remote attackers scanning for vulnerable devices, increasing the risk of widespread attacks. Organizations relying on these routers for critical connectivity or security functions face elevated risks of operational disruption and data breaches.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by implementing network segmentation and firewall rules to limit access to trusted IP addresses only. 2. Disable remote management features if not required to reduce exposure to external attackers. 3. Monitor network traffic for unusual requests targeting /cgi-bin/cstecgi.cgi or anomalous ssid parameter values indicative of exploitation attempts. 4. Apply any vendor-released firmware updates or patches addressing this vulnerability as soon as they become available. 5. If patches are unavailable, consider replacing affected devices with models not impacted by this vulnerability or deploying compensating controls such as intrusion prevention systems (IPS) with signatures targeting this exploit. 6. Conduct regular vulnerability scans and penetration tests to identify and remediate similar issues proactively. 7. Educate network administrators about this vulnerability and ensure incident response plans include steps for containment and recovery from router compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T20:19:59.156Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e3ba2d302b072d9c4ca7d

Added to database: 1/19/2026, 2:11:46 PM

Last enriched: 2/23/2026, 10:15:18 PM

Last updated: 3/25/2026, 4:41:48 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses