Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2167: OS Command Injection in Totolink WA300

0
Medium
VulnerabilityCVE-2026-2167cvecve-2026-2167
Published: Sun Feb 08 2026 (02/08/2026, 17:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: WA300

Description

CVE-2026-2167 is a medium-severity OS command injection vulnerability affecting the Totolink WA300 router firmware version 5. 2cu. 7112_B20190227. The flaw exists in the setAPNetwork function within /cgi-bin/cstecgi. cgi, where manipulation of the Ipaddr argument allows remote attackers to execute arbitrary OS commands. Exploitation does not require authentication or user interaction, increasing risk. Although no known exploits are currently active in the wild, a public exploit is available, raising the likelihood of future attacks. The vulnerability impacts confidentiality, integrity, and availability of affected devices. European organizations using Totolink WA300 routers should prioritize patching or mitigating this issue to prevent potential network compromise. Countries with higher Totolink market penetration and critical infrastructure reliance on these devices are at greater risk.

AI-Powered Analysis

AILast updated: 02/08/2026, 17:30:36 UTC

Technical Analysis

CVE-2026-2167 is an OS command injection vulnerability identified in the Totolink WA300 wireless router firmware version 5.2cu.7112_B20190227. The vulnerability resides in the setAPNetwork function of the /cgi-bin/cstecgi.cgi CGI script, specifically in the handling of the Ipaddr parameter. An attacker can remotely supply crafted input to this parameter, which is improperly sanitized, allowing arbitrary operating system commands to be executed with the privileges of the web server process. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS v4.0 score of 5.3 reflects a medium severity, considering the ease of remote exploitation but limited scope of impact due to privilege level and lack of direct system-wide control. While no active exploitation has been reported, the availability of a public exploit increases the risk of future attacks. Successful exploitation could lead to unauthorized access, data leakage, device manipulation, or denial of service, impacting the router’s confidentiality, integrity, and availability. The vulnerability is specific to a single firmware version, so devices running other versions may not be affected. No official patches or updates have been linked yet, so mitigation relies on network-level controls or firmware upgrades once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for those deploying Totolink WA300 routers in their infrastructure. Exploitation could allow attackers to gain unauthorized control over the router, potentially leading to interception or manipulation of network traffic, disruption of network services, or pivoting to internal systems. This could compromise sensitive data confidentiality and integrity, and degrade availability of critical network resources. Organizations in sectors such as telecommunications, government, finance, and critical infrastructure are particularly vulnerable due to the strategic importance of their networks. The lack of authentication requirement means attackers can exploit the vulnerability remotely without prior access, increasing the threat surface. Given the public availability of an exploit, the risk of targeted attacks or automated scanning campaigns is elevated. European entities relying on this router model should assess their exposure and implement mitigations promptly to avoid potential operational and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should include isolating affected Totolink WA300 devices from untrusted networks, especially the internet, to reduce exposure to remote attacks. 2. Implement network-level access controls such as firewall rules to restrict access to the router’s management interface, allowing only trusted IP addresses or internal networks. 3. Monitor network traffic for unusual or suspicious activity targeting the /cgi-bin/cstecgi.cgi endpoint or attempts to manipulate the Ipaddr parameter. 4. Disable remote management features on the router if not required, to minimize the attack surface. 5. Regularly check for firmware updates or security advisories from Totolink and apply patches as soon as they become available. 6. Consider replacing affected devices with alternative models from vendors with a stronger security track record if patching is delayed. 7. Conduct internal audits to identify all Totolink WA300 devices in use and verify their firmware versions. 8. Educate network administrators about this vulnerability and the importance of timely mitigation steps. 9. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection attempts targeting this vulnerability. 10. Maintain comprehensive backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T09:15:46.201Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988c4df4b57a58fa1b81884

Added to database: 2/8/2026, 5:16:15 PM

Last enriched: 2/8/2026, 5:30:36 PM

Last updated: 2/8/2026, 6:21:17 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats