CVE-2026-1158: Buffer Overflow in Totolink LR350
A security flaw has been discovered in Totolink LR350 9.3.5u.6369_B20220309. This vulnerability affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
AI Analysis
Technical Summary
CVE-2026-1158 is a buffer overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The flaw exists in the setWizardCfg function within the /cgi-bin/cstecgi.cgi component, which handles POST requests. Specifically, the vulnerability arises from improper handling of the ssid argument, where crafted input can overflow the buffer allocated for this parameter. This overflow can be exploited remotely by an attacker without requiring authentication or user interaction, making it a critical remote code execution vector. The vulnerability allows an attacker to potentially execute arbitrary code with elevated privileges, disrupt router operations, or cause denial of service conditions. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for privileges or user interaction. Although no active exploitation has been reported in the wild, the availability of a public exploit increases the urgency for mitigation. The affected product, Totolink LR350, is a widely deployed router model, often used in small to medium business and home environments, making the attack surface significant. The vulnerability resides in the network-facing CGI interface, which is typically exposed to the internet or local networks, further increasing risk. No official patches or updates have been linked yet, so mitigation relies on network-level controls and configuration changes until a firmware update is released.
Potential Impact
The impact of CVE-2026-1158 is substantial for organizations using the Totolink LR350 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code, potentially gaining control over network traffic, intercepting sensitive data, or pivoting to internal networks. This undermines confidentiality by exposing network communications, integrity by allowing malicious modifications to router configurations or firmware, and availability by enabling denial of service attacks. Given the router's role as a network gateway, compromise can facilitate broader attacks on connected systems. The ease of remote exploitation without authentication or user interaction increases the likelihood of widespread attacks, especially as a public exploit is available. Organizations relying on these routers for critical network infrastructure face risks of operational disruption, data breaches, and potential lateral movement by attackers. The threat is particularly acute for environments with internet-exposed management interfaces or insufficient network segmentation.
Mitigation Recommendations
To mitigate CVE-2026-1158, organizations should immediately assess their deployment of Totolink LR350 routers and restrict access to the /cgi-bin/cstecgi.cgi interface. Network-level controls such as firewall rules should be implemented to block incoming traffic to the router's management interface from untrusted networks, especially the internet. Disabling remote management features or restricting them to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual POST requests targeting the setWizardCfg function or the ssid parameter may help detect exploitation attempts. Until an official firmware patch is released, consider isolating affected devices on segmented networks to limit potential lateral movement. Regularly check for vendor updates or security advisories and apply firmware updates promptly once available. Additionally, employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit patterns. Document and enforce strong network access policies and educate administrators about the risks of exposed router management interfaces.
Affected Countries
United States, China, South Korea, Germany, United Kingdom, France, India, Brazil, Russia, Japan
CVE-2026-1158: Buffer Overflow in Totolink LR350
Description
A security flaw has been discovered in Totolink LR350 9.3.5u.6369_B20220309. This vulnerability affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1158 is a buffer overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The flaw exists in the setWizardCfg function within the /cgi-bin/cstecgi.cgi component, which handles POST requests. Specifically, the vulnerability arises from improper handling of the ssid argument, where crafted input can overflow the buffer allocated for this parameter. This overflow can be exploited remotely by an attacker without requiring authentication or user interaction, making it a critical remote code execution vector. The vulnerability allows an attacker to potentially execute arbitrary code with elevated privileges, disrupt router operations, or cause denial of service conditions. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for privileges or user interaction. Although no active exploitation has been reported in the wild, the availability of a public exploit increases the urgency for mitigation. The affected product, Totolink LR350, is a widely deployed router model, often used in small to medium business and home environments, making the attack surface significant. The vulnerability resides in the network-facing CGI interface, which is typically exposed to the internet or local networks, further increasing risk. No official patches or updates have been linked yet, so mitigation relies on network-level controls and configuration changes until a firmware update is released.
Potential Impact
The impact of CVE-2026-1158 is substantial for organizations using the Totolink LR350 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code, potentially gaining control over network traffic, intercepting sensitive data, or pivoting to internal networks. This undermines confidentiality by exposing network communications, integrity by allowing malicious modifications to router configurations or firmware, and availability by enabling denial of service attacks. Given the router's role as a network gateway, compromise can facilitate broader attacks on connected systems. The ease of remote exploitation without authentication or user interaction increases the likelihood of widespread attacks, especially as a public exploit is available. Organizations relying on these routers for critical network infrastructure face risks of operational disruption, data breaches, and potential lateral movement by attackers. The threat is particularly acute for environments with internet-exposed management interfaces or insufficient network segmentation.
Mitigation Recommendations
To mitigate CVE-2026-1158, organizations should immediately assess their deployment of Totolink LR350 routers and restrict access to the /cgi-bin/cstecgi.cgi interface. Network-level controls such as firewall rules should be implemented to block incoming traffic to the router's management interface from untrusted networks, especially the internet. Disabling remote management features or restricting them to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual POST requests targeting the setWizardCfg function or the ssid parameter may help detect exploitation attempts. Until an official firmware patch is released, consider isolating affected devices on segmented networks to limit potential lateral movement. Regularly check for vendor updates or security advisories and apply firmware updates promptly once available. Additionally, employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit patterns. Document and enforce strong network access policies and educate administrators about the risks of exposed router management interfaces.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T20:20:02.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e462dd302b072d9c86a4d
Added to database: 1/19/2026, 2:56:45 PM
Last enriched: 2/23/2026, 10:15:38 PM
Last updated: 3/24/2026, 4:29:43 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.