Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1326: Command Injection in Totolink NR1800X

0
Medium
VulnerabilityCVE-2026-1326cvecve-2026-1326
Published: Thu Jan 22 2026 (01/22/2026, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: NR1800X

Description

A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:23:00 UTC

Technical Analysis

CVE-2026-1326 is a command injection vulnerability identified in the Totolink NR1800X router firmware version 9.1.0u.6279_B20210910. The flaw resides in the setWanCfg function of the /cgi-bin/cstecgi.cgi component, which handles POST requests. Specifically, the vulnerability arises from improper sanitization of the Hostname parameter, allowing an attacker to inject and execute arbitrary system commands on the device remotely. The attack vector is network-based, requiring no user interaction and no authentication, though it requires low privileges (likely accessible to authenticated users or from the local network). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits are currently observed in the wild, proof-of-concept exploit code has been publicly released, increasing the risk of future attacks. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to full compromise of the router, interception or manipulation of network traffic, or pivoting to internal networks. The vulnerability affects a specific firmware version, and no official patches or mitigations have been linked yet. The Totolink NR1800X is a consumer and small business router, so the vulnerability primarily impacts these environments.

Potential Impact

The exploitation of CVE-2026-1326 can have significant consequences for organizations and individuals using the affected Totolink NR1800X router firmware. Attackers could gain the ability to execute arbitrary commands on the router remotely, leading to full device compromise. This could result in interception or manipulation of network traffic, disruption of internet connectivity, unauthorized access to internal networks, and potential lateral movement to other devices. For small businesses and home users, this could mean loss of confidentiality and integrity of sensitive data, as well as denial of service. In environments where these routers are deployed as part of critical infrastructure or branch office networks, the impact could extend to operational disruptions and increased risk of broader network breaches. The medium CVSS score reflects the moderate ease of exploitation combined with partial impact on confidentiality, integrity, and availability. However, the availability of public exploit code raises the likelihood of exploitation attempts, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2026-1326, organizations should first verify if they are running the affected firmware version 9.1.0u.6279_B20210910 on Totolink NR1800X routers. If so, they should immediately check for any official firmware updates or patches from Totolink addressing this vulnerability and apply them as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management over the internet. Implementing network segmentation to isolate vulnerable devices can reduce the risk of lateral movement. Monitoring router logs and network traffic for suspicious activity related to the /cgi-bin/cstecgi.cgi endpoint or unusual command execution attempts is recommended. Additionally, changing default credentials and enforcing strong authentication mechanisms can help reduce the attack surface. If feasible, consider replacing affected devices with models that have no known vulnerabilities or have been patched. Finally, educating users about the risks and signs of router compromise can aid early detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-22T07:43:42.391Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69722b404623b1157c72bdd5

Added to database: 1/22/2026, 1:50:56 PM

Last enriched: 2/23/2026, 10:23:00 PM

Last updated: 3/25/2026, 1:33:42 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses