Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4497: OS Command Injection in Totolink WA300

0
Medium
VulnerabilityCVE-2026-4497cvecve-2026-4497
Published: Fri Mar 20 2026 (03/20/2026, 19:02:12 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: WA300

Description

CVE-2026-4497 is a remote OS command injection vulnerability in the Totolink WA300 router, specifically in the recvUpgradeNewFw function within /cgi-bin/cstecgi. cgi. It affects firmware version 5. 2cu. 7112_B20190227. The flaw allows unauthenticated attackers to execute arbitrary OS commands remotely without user interaction. Although the CVSS 4. 0 score rates it as medium severity (6. 9), the vulnerability poses significant risks to confidentiality, integrity, and availability of affected devices. No patches or known exploits in the wild have been reported yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:33:08 UTC

Technical Analysis

CVE-2026-4497 identifies a critical security flaw in the Totolink WA300 router firmware version 5.2cu.7112_B20190227. The vulnerability resides in the recvUpgradeNewFw function of the /cgi-bin/cstecgi.cgi endpoint, which improperly handles input parameters, leading to OS command injection. This flaw allows attackers to remotely execute arbitrary operating system commands on the device without requiring authentication or user interaction. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and no privileges or user interaction needed, as indicated by the CVSS 4.0 vector. The impact on confidentiality, integrity, and availability is limited but present, as attackers could manipulate device firmware upgrade processes or execute commands that compromise device operation or network security. Although no public patches or exploits in the wild are currently reported, the public disclosure of the exploit code increases the risk of future attacks. The vulnerability affects a specific firmware version, emphasizing the need for firmware updates or alternative mitigations. The Totolink WA300 is a widely used consumer and small office router, making this vulnerability relevant to many organizations and home users relying on this device for network connectivity and security.

Potential Impact

The exploitation of CVE-2026-4497 can lead to unauthorized remote code execution on affected Totolink WA300 routers, potentially allowing attackers to take full control of the device. This can result in interception or manipulation of network traffic, disruption of network services, and the establishment of persistent backdoors. Confidentiality may be compromised if attackers access sensitive data passing through the router. Integrity is at risk as attackers could alter firmware or configuration settings, potentially leading to further compromise or lateral movement within the network. Availability could be impacted if attackers disrupt router functionality or launch denial-of-service conditions. Organizations relying on these routers for critical network infrastructure or remote access could face operational disruptions and increased exposure to broader cyberattacks. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous, as it can be exploited by remote attackers without any prior access.

Mitigation Recommendations

1. Immediately disable remote management interfaces on the Totolink WA300 to reduce exposure to external attackers. 2. Restrict access to the /cgi-bin/cstecgi.cgi endpoint via firewall rules or network segmentation, allowing only trusted internal IP addresses if remote management is necessary. 3. Monitor network traffic for unusual requests targeting the recvUpgradeNewFw function or other suspicious CGI calls indicative of exploitation attempts. 4. If available, apply firmware updates from Totolink addressing this vulnerability; if no official patch exists, consider upgrading to a newer, unaffected device model. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures for command injection attempts targeting Totolink devices. 6. Regularly audit router configurations and logs for unauthorized changes or signs of compromise. 7. Educate users and administrators about the risks of exposing management interfaces and the importance of strong network perimeter controls. 8. Consider isolating vulnerable devices on separate VLANs to limit potential lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-20T09:21:26.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bd9b64e32a4fbe5fc09f2a

Added to database: 3/20/2026, 7:09:24 PM

Last enriched: 3/27/2026, 7:33:08 PM

Last updated: 5/2/2026, 11:43:27 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses