Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5102: Command Injection in Totolink A3300R

0
Medium
VulnerabilityCVE-2026-5102cvecve-2026-5102
Published: Mon Mar 30 2026 (03/30/2026, 00:00:20 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: A3300R

Description

CVE-2026-5102 is a medium severity command injection vulnerability in the Totolink A3300R router firmware version 17. 0. 0cu. 557_b20221024. It affects the setSmartQosCfg function within the /cgi-bin/cstecgi. cgi component, where manipulation of the qos_up_bw parameter allows remote attackers to execute arbitrary commands. The vulnerability requires no user interaction and no authentication, making it remotely exploitable over the network. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active attacks. This flaw can compromise the confidentiality, integrity, and availability of affected devices, potentially allowing attackers to take control of the router. Organizations using this router model should prioritize patching or mitigating this vulnerability to prevent unauthorized access and control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 00:23:21 UTC

Technical Analysis

CVE-2026-5102 is a command injection vulnerability identified in the Totolink A3300R router firmware version 17.0.0cu.557_b20221024. The flaw resides in the setSmartQosCfg function of the /cgi-bin/cstecgi.cgi script, specifically in the handling of the qos_up_bw parameter. An attacker can remotely send crafted requests manipulating this parameter to inject arbitrary system commands, which the device executes with elevated privileges. This vulnerability does not require authentication or user interaction, making it highly accessible to remote attackers. The vulnerability stems from insufficient input validation and sanitization in the parameter handler component, allowing shell command injection. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, and no required privileges or user interaction, but limited impact scope and partial confidentiality, integrity, and availability impact. Although no active exploitation has been reported, the public release of an exploit increases the likelihood of attacks. This vulnerability can lead to full device compromise, enabling attackers to manipulate network traffic, intercept data, or launch further attacks within the network. The affected firmware version is specific, so devices running other versions may not be vulnerable. No official patches or mitigation links are currently provided, requiring users to monitor vendor advisories closely.

Potential Impact

The impact of CVE-2026-5102 is significant for organizations using the Totolink A3300R router with the vulnerable firmware. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised device as a pivot point for further attacks. Confidentiality is at risk as attackers may access sensitive data passing through the router. Integrity and availability can be compromised by altering device configurations or causing denial of service. The medium CVSS score reflects that while the attack is straightforward, the scope is limited to affected devices. Organizations relying on these routers for critical network infrastructure or in sensitive environments face increased risk of operational disruption and data breaches. The public availability of an exploit increases the urgency for mitigation to prevent exploitation by opportunistic attackers or automated scanning tools.

Mitigation Recommendations

To mitigate CVE-2026-5102, organizations should first verify if their Totolink A3300R devices run the vulnerable firmware version 17.0.0cu.557_b20221024. If so, they should immediately check for vendor firmware updates or security advisories addressing this vulnerability and apply patches as soon as they become available. In the absence of official patches, network administrators should restrict access to the router's management interface by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Disabling remote management features or changing default management ports can reduce attack surface. Monitoring network traffic for unusual requests targeting /cgi-bin/cstecgi.cgi and the qos_up_bw parameter can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for command injection patterns may provide additional defense. Regularly auditing device configurations and logs can help identify unauthorized changes. Finally, consider replacing affected devices with models that have a stronger security posture if patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-29T17:50:47.089Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c9befee6bfc5ba1d524373

Added to database: 3/30/2026, 12:08:30 AM

Last enriched: 3/30/2026, 12:23:21 AM

Last updated: 3/30/2026, 2:39:05 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses