Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5105: Command Injection in Totolink A3300R

0
Medium
VulnerabilityCVE-2026-5105cvecve-2026-5105
Published: Mon Mar 30 2026 (03/30/2026, 03:00:20 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: A3300R

Description

CVE-2026-5105 is a command injection vulnerability in the Totolink A3300R router firmware version 17. 0. 0cu. 557_b20221024. The flaw exists in the setVpnPassCfg function within the /cgi-bin/cstecgi. cgi component, specifically when handling the pptpPassThru argument. An attacker can remotely exploit this vulnerability without authentication or user interaction to execute arbitrary commands on the device. Although the CVSS score is medium (5. 3), the vulnerability allows remote code execution with low attack complexity and no privileges required. No patches are currently available, and public exploit code exists, increasing the risk of exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 04:08:21 UTC

Technical Analysis

CVE-2026-5105 is a command injection vulnerability identified in the Totolink A3300R router firmware version 17.0.0cu.557_b20221024. The vulnerability resides in the setVpnPassCfg function of the /cgi-bin/cstecgi.cgi script, which handles parameter inputs related to VPN password configuration. Specifically, manipulation of the pptpPassThru argument allows an attacker to inject arbitrary commands that the system executes. This flaw is remotely exploitable without requiring authentication or user interaction, making it particularly dangerous. The vulnerability arises from insufficient input validation and sanitization in the parameter handler component, allowing crafted input to be interpreted as system commands. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the CVSS score is medium (5.3), the presence of public exploit code increases the likelihood of exploitation. No official patches or vendor advisories have been published yet, leaving affected devices vulnerable. The Totolink A3300R is a consumer and small business router, often deployed in home and office environments, which could serve as entry points for attackers to pivot into larger networks. The vulnerability could be leveraged to execute arbitrary commands, potentially leading to device takeover, network traffic interception, or disruption of services. Given the ease of exploitation and remote attack vector, this vulnerability represents a significant risk to affected users until mitigated.

Potential Impact

The primary impact of CVE-2026-5105 is unauthorized remote command execution on affected Totolink A3300R devices. This can lead to full compromise of the router, allowing attackers to alter configurations, intercept or redirect network traffic, deploy malware, or use the device as a foothold for further attacks within the network. Confidentiality is at risk due to potential data interception; integrity can be compromised by unauthorized configuration changes; and availability may be affected if the device is disrupted or used in denial-of-service attacks. Organizations relying on these routers for VPN or network perimeter security may experience breaches or service outages. The lack of authentication requirement and no need for user interaction significantly increase the threat level. Although the CVSS score is medium, the exploitability and potential for lateral movement within networks elevate the operational risk. The absence of patches means that affected devices remain vulnerable, increasing the window of exposure. This can impact small businesses, home offices, and potentially larger organizations using these routers as part of their infrastructure.

Mitigation Recommendations

1. Immediately isolate affected Totolink A3300R devices from untrusted networks to prevent remote exploitation. 2. Implement network-level access controls such as firewall rules to restrict access to the router’s management interfaces, especially the /cgi-bin/cstecgi.cgi endpoint. 3. Monitor network traffic for unusual or unauthorized commands targeting the pptpPassThru parameter or suspicious CGI requests. 4. Disable PPTP VPN passthrough functionality if not required, reducing the attack surface. 5. Regularly audit router configurations and logs for signs of compromise or unauthorized changes. 6. Engage with the vendor for firmware updates or patches and apply them promptly once available. 7. Consider replacing affected devices with models from vendors with timely security update practices if patching is delayed. 8. Educate users and administrators about the risks of exposing router management interfaces to the internet. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting this vulnerability. 10. Maintain an incident response plan to quickly address any detected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-29T17:50:56.050Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c9f3ace6bfc5ba1da3b131

Added to database: 3/30/2026, 3:53:16 AM

Last enriched: 3/30/2026, 4:08:21 AM

Last updated: 3/30/2026, 5:03:50 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses