CVE-2026-3301: OS Command Injection in Totolink N300RH
CVE-2026-3301 is a critical OS command injection vulnerability in the Totolink N300RH router's web management interface, specifically in the setWebWlanIdx function of /cgi-bin/cstecgi. cgi. The flaw allows unauthenticated remote attackers to execute arbitrary OS commands by manipulating the webWlanIdx parameter. This vulnerability affects firmware version 6. 1c. 1353_B20190305 and requires no user interaction or privileges to exploit. With a CVSS 4. 0 score of 9. 3, it poses a severe risk to confidentiality, integrity, and availability of affected devices. Although no public exploits have been observed in the wild yet, the exploit code has been released publicly, increasing the likelihood of attacks.
AI Analysis
Technical Summary
CVE-2026-3301 identifies a critical OS command injection vulnerability in the Totolink N300RH router, firmware version 6.1c.1353_B20190305. The vulnerability resides in the setWebWlanIdx function within the /cgi-bin/cstecgi.cgi component of the device's web management interface. By manipulating the webWlanIdx argument, an attacker can inject arbitrary operating system commands that the device executes with the privileges of the web server process. This flaw is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability is classified as critical with a CVSS 4.0 score of 9.3, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability affects the device's core management interface, potentially allowing full device compromise, unauthorized configuration changes, or pivoting into internal networks. Although no active exploitation has been reported, the public release of exploit code increases the urgency for mitigation. No official patches have been linked yet, indicating that affected users must rely on alternative mitigations until a firmware update is available.
Potential Impact
The impact of CVE-2026-3301 is severe for organizations using the Totolink N300RH router, particularly those running the vulnerable firmware version. Successful exploitation allows remote attackers to execute arbitrary OS commands, leading to full device compromise. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and potential lateral movement within internal networks. The confidentiality, integrity, and availability of organizational networks are at risk. Compromised routers can be used as entry points for further attacks, including data exfiltration, deployment of malware, or establishing persistent backdoors. Small and medium enterprises, home users, and branch offices relying on this device are especially vulnerable. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. The public availability of exploit code further elevates the threat level globally.
Mitigation Recommendations
1. Immediately check the firmware version of all Totolink N300RH devices and isolate those running version 6.1c.1353_B20190305. 2. Monitor the vendor's official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 3. If no patch is available, restrict access to the router's web management interface by limiting exposure to trusted internal networks only, using firewall rules or network segmentation. 4. Disable remote management features if not required to reduce the attack surface. 5. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures to detect exploitation attempts targeting the webWlanIdx parameter. 6. Regularly audit router configurations and logs for suspicious activities indicative of exploitation. 7. Consider replacing vulnerable devices if timely patches are not provided, especially in high-security environments. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability.
Affected Countries
United States, China, South Korea, India, Germany, Brazil, Russia, United Kingdom, France, Japan
CVE-2026-3301: OS Command Injection in Totolink N300RH
Description
CVE-2026-3301 is a critical OS command injection vulnerability in the Totolink N300RH router's web management interface, specifically in the setWebWlanIdx function of /cgi-bin/cstecgi. cgi. The flaw allows unauthenticated remote attackers to execute arbitrary OS commands by manipulating the webWlanIdx parameter. This vulnerability affects firmware version 6. 1c. 1353_B20190305 and requires no user interaction or privileges to exploit. With a CVSS 4. 0 score of 9. 3, it poses a severe risk to confidentiality, integrity, and availability of affected devices. Although no public exploits have been observed in the wild yet, the exploit code has been released publicly, increasing the likelihood of attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-3301 identifies a critical OS command injection vulnerability in the Totolink N300RH router, firmware version 6.1c.1353_B20190305. The vulnerability resides in the setWebWlanIdx function within the /cgi-bin/cstecgi.cgi component of the device's web management interface. By manipulating the webWlanIdx argument, an attacker can inject arbitrary operating system commands that the device executes with the privileges of the web server process. This flaw is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability is classified as critical with a CVSS 4.0 score of 9.3, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability affects the device's core management interface, potentially allowing full device compromise, unauthorized configuration changes, or pivoting into internal networks. Although no active exploitation has been reported, the public release of exploit code increases the urgency for mitigation. No official patches have been linked yet, indicating that affected users must rely on alternative mitigations until a firmware update is available.
Potential Impact
The impact of CVE-2026-3301 is severe for organizations using the Totolink N300RH router, particularly those running the vulnerable firmware version. Successful exploitation allows remote attackers to execute arbitrary OS commands, leading to full device compromise. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and potential lateral movement within internal networks. The confidentiality, integrity, and availability of organizational networks are at risk. Compromised routers can be used as entry points for further attacks, including data exfiltration, deployment of malware, or establishing persistent backdoors. Small and medium enterprises, home users, and branch offices relying on this device are especially vulnerable. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. The public availability of exploit code further elevates the threat level globally.
Mitigation Recommendations
1. Immediately check the firmware version of all Totolink N300RH devices and isolate those running version 6.1c.1353_B20190305. 2. Monitor the vendor's official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 3. If no patch is available, restrict access to the router's web management interface by limiting exposure to trusted internal networks only, using firewall rules or network segmentation. 4. Disable remote management features if not required to reduce the attack surface. 5. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures to detect exploitation attempts targeting the webWlanIdx parameter. 6. Regularly audit router configurations and logs for suspicious activities indicative of exploitation. 7. Consider replacing vulnerable devices if timely patches are not provided, especially in high-security environments. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-26T20:33:00.808Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a12e7632ffcdb8a2ebeaba
Added to database: 2/27/2026, 5:41:10 AM
Last enriched: 2/27/2026, 5:55:29 AM
Last updated: 2/27/2026, 6:47:42 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3302: Cross Site Scripting in SourceCodester Doctor Appointment System
MediumCVE-2026-27653: Incorrect default permissions in Soliton Systems K.K. Soliton SecureBrowser for OneGate
MediumCVE-2026-3293: Inefficient Regular Expression Complexity in snowflakedb snowflake-jdbc
MediumCVE-2026-28372: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in GNU inetutils
HighCVE-2026-3292: SQL Injection in jizhiCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.