Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5104: Command Injection in Totolink A3300R

0
Medium
VulnerabilityCVE-2026-5104cvecve-2026-5104
Published: Mon Mar 30 2026 (03/30/2026, 02:00:15 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: A3300R

Description

CVE-2026-5104 is a command injection vulnerability found in the Totolink A3300R router firmware version 17. 0. 0cu. 557_b20221024. The flaw exists in the setStaticRoute function within the /cgi-bin/cstecgi. cgi file, where manipulation of the 'ip' argument allows an attacker to execute arbitrary commands on the device. This vulnerability can be exploited remotely without user interaction or authentication, increasing its risk. Although the CVSS score is medium (5. 3), the ability to perform command injection remotely poses significant risks to device integrity and network security. No public exploits are currently known in the wild, and no patches have been linked yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 02:53:29 UTC

Technical Analysis

CVE-2026-5104 is a command injection vulnerability affecting the Totolink A3300R router firmware version 17.0.0cu.557_b20221024. The vulnerability resides in the setStaticRoute function of the /cgi-bin/cstecgi.cgi CGI script, where the 'ip' parameter is improperly sanitized. This lack of input validation allows an attacker to inject arbitrary shell commands by manipulating the 'ip' argument, which the device executes with elevated privileges. The attack vector is remote network access, requiring no authentication or user interaction, making it easier for attackers to exploit. The vulnerability's CVSS 4.0 base score is 5.3, reflecting medium severity due to limited impact on confidentiality and availability but significant integrity risk. The vulnerability has been publicly disclosed, increasing the likelihood of exploitation, although no known exploits are currently active in the wild. The absence of official patches or mitigation guidance from Totolink at this time leaves devices exposed. This vulnerability could allow attackers to gain control over the router, modify routing tables, intercept or redirect traffic, or use the device as a foothold for further network compromise.

Potential Impact

The exploitation of CVE-2026-5104 can have serious consequences for organizations using the Totolink A3300R router. Successful command injection can lead to full compromise of the router, allowing attackers to alter network configurations, intercept sensitive data, or launch further attacks within the internal network. This undermines the integrity and availability of network services and can facilitate lateral movement to other critical systems. Since the vulnerability requires no authentication and can be exploited remotely, attackers can target exposed devices over the internet or untrusted networks. This risk is heightened in environments where these routers serve as gateways for business-critical operations or connect sensitive infrastructure. The medium CVSS score reflects moderate impact, but the ease of exploitation and potential for persistent control make this a significant threat. Organizations may face data breaches, service disruptions, or reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2026-5104, organizations should immediately assess their network for the presence of Totolink A3300R routers running the affected firmware version 17.0.0cu.557_b20221024. If possible, isolate these devices from untrusted networks and restrict remote management access to trusted IP addresses only. Network administrators should disable or restrict access to the /cgi-bin/cstecgi.cgi interface if it is not required. Monitoring network traffic for unusual commands or changes in routing tables can help detect exploitation attempts. Since no official patch is currently available, consider deploying network-level protections such as web application firewalls (WAFs) or intrusion prevention systems (IPS) configured to detect and block command injection patterns targeting this CGI endpoint. Engage with Totolink support for updates or firmware patches and plan for timely firmware upgrades once available. Additionally, implement network segmentation to limit the impact of a compromised router and maintain regular backups of router configurations to enable quick recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-29T17:50:53.126Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c9e219e6bfc5ba1d89ce55

Added to database: 3/30/2026, 2:38:17 AM

Last enriched: 3/30/2026, 2:53:29 AM

Last updated: 3/30/2026, 3:45:16 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses