Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1158: Buffer Overflow in Totolink LR350

0
High
VulnerabilityCVE-2026-1158cvecve-2026-1158
Published: Mon Jan 19 2026 (01/19/2026, 14:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: LR350

Description

CVE-2026-1158 is a high-severity buffer overflow vulnerability in the Totolink LR350 router firmware version 9. 3. 5u. 6369_B20220309. The flaw exists in the setWizardCfg function within the /cgi-bin/cstecgi. cgi POST request handler, where manipulation of the ssid argument can trigger a buffer overflow. This vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to execute arbitrary code with elevated privileges. Although no public exploits are currently observed in the wild, a proof-of-concept exploit has been released, increasing the risk of active exploitation. European organizations using affected Totolink LR350 devices may face risks including device compromise, network disruption, and data breaches. Mitigation requires applying vendor patches once available or implementing network-level protections such as restricting access to router management interfaces and monitoring for anomalous POST requests targeting the vulnerable endpoint.

AI-Powered Analysis

AILast updated: 01/19/2026, 15:11:05 UTC

Technical Analysis

CVE-2026-1158 is a remote buffer overflow vulnerability identified in the Totolink LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the setWizardCfg function of the /cgi-bin/cstecgi.cgi component, which handles POST requests. Specifically, the ssid parameter is improperly validated, allowing an attacker to send a crafted POST request that overflows the buffer. This overflow can corrupt memory, potentially enabling arbitrary code execution with elevated privileges on the device. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its critical impact on confidentiality, integrity, and availability. Although no confirmed exploits are reported in the wild, a public proof-of-concept exploit exists, increasing the likelihood of exploitation attempts. The flaw can lead to full device compromise, enabling attackers to control network traffic, intercept data, or launch further attacks within the network. The absence of vendor patches at the time of disclosure necessitates immediate mitigation through network segmentation, access restrictions, and monitoring. This vulnerability highlights the importance of secure input validation in embedded device firmware, especially in network infrastructure components.

Potential Impact

For European organizations, exploitation of CVE-2026-1158 could result in severe consequences including unauthorized control over affected routers, leading to interception or manipulation of network traffic, disruption of internet connectivity, and potential lateral movement within corporate networks. Compromised devices could serve as footholds for attackers to deploy malware, exfiltrate sensitive data, or launch attacks against other internal systems. Critical infrastructure sectors relying on Totolink LR350 devices for connectivity may experience operational disruptions. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these routers are exposed to untrusted networks or the internet. The public availability of an exploit further elevates the threat, as less skilled attackers can leverage it. Overall, the vulnerability poses a significant risk to confidentiality, integrity, and availability of network services in European enterprises and public sector organizations.

Mitigation Recommendations

1. Immediately restrict access to the management interface of Totolink LR350 devices by implementing firewall rules or network segmentation to limit POST requests to trusted sources only. 2. Monitor network traffic for unusual POST requests targeting /cgi-bin/cstecgi.cgi, especially those containing suspicious ssid parameters. 3. Disable remote management features if not required, or restrict them to secure VPN connections. 4. Apply vendor firmware updates or patches as soon as they become available to address the buffer overflow vulnerability. 5. Conduct regular vulnerability scans and penetration tests focused on network infrastructure devices to detect similar flaws. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of identifying exploitation attempts against this vulnerability. 7. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enable rapid incident response. 8. Maintain an inventory of all Totolink LR350 devices in use to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T20:20:02.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e462dd302b072d9c86a4d

Added to database: 1/19/2026, 2:56:45 PM

Last enriched: 1/19/2026, 3:11:05 PM

Last updated: 1/19/2026, 4:04:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats