Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5178: Command Injection in Totolink A3300R

0
Medium
VulnerabilityCVE-2026-5178cvecve-2026-5178
Published: Tue Mar 31 2026 (03/31/2026, 03:00:14 UTC)
Source: CVE Database V5
Vendor/Project: Totolink
Product: A3300R

Description

CVE-2026-5178 is a command injection vulnerability in the Totolink A3300R router firmware version 17. 0. 0cu. 557_b20221024. The flaw exists in the setIptvCfg function within /cgi-bin/cstecgi. cgi, where manipulation of the vlanPriLan3 argument allows remote attackers to execute arbitrary commands. Exploitation does not require user interaction but does require low-level privileges. Although the CVSS score is medium (5. 3), the vulnerability enables attackers to compromise device integrity and potentially disrupt network operations. No patches have been officially released yet, and public exploit code is available, increasing the risk of exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 03:53:21 UTC

Technical Analysis

CVE-2026-5178 is a command injection vulnerability identified in the Totolink A3300R router running firmware version 17.0.0cu.557_b20221024. The vulnerability resides in the setIptvCfg function of the /cgi-bin/cstecgi.cgi script, where the vlanPriLan3 parameter is improperly sanitized. This allows an attacker with low privileges to inject arbitrary shell commands remotely without requiring user interaction. The vulnerability can be exploited over the network, given that the attacker can access the affected CGI endpoint. Command injection vulnerabilities are critical because they allow execution of arbitrary commands on the underlying operating system, potentially leading to full device compromise, data theft, or disruption of network services. Although the CVSS 4.0 score is 5.3 (medium severity), the exploitability is relatively straightforward due to lack of authentication or user interaction requirements, but it does require low privileges. No official patches or firmware updates have been released at the time of disclosure, but public exploit code is available, increasing the risk of exploitation. This vulnerability affects only the specified firmware version of the Totolink A3300R router, which is commonly used in small to medium-sized networks. The vulnerability's presence in a network device makes it particularly concerning as it can be a pivot point for attackers to infiltrate internal networks.

Potential Impact

The impact of CVE-2026-5178 on organizations can be significant despite its medium severity rating. Successful exploitation allows remote attackers to execute arbitrary commands on the router, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and deployment of persistent malware or backdoors. For organizations relying on Totolink A3300R routers, especially in critical infrastructure or business environments, this vulnerability could lead to data breaches, operational downtime, and reputational damage. The lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, the public availability of exploit code means attackers can automate attacks, increasing the scale and speed of potential incidents. The vulnerability could also be leveraged as part of larger multi-stage attacks targeting enterprise or service provider networks.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface, especially from untrusted networks, by implementing network segmentation and firewall rules. 2. Disable remote management features if not required to reduce exposure. 3. Monitor network traffic and device logs for unusual commands or access patterns targeting /cgi-bin/cstecgi.cgi or the vlanPriLan3 parameter. 4. Apply any available firmware updates from Totolink as soon as they are released addressing this vulnerability. 5. If no patch is available, consider temporarily replacing affected devices with models not impacted by this vulnerability or deploying compensating controls such as network-level intrusion prevention systems (IPS) to detect and block exploitation attempts. 6. Conduct regular security assessments of network devices to identify and remediate similar vulnerabilities proactively. 7. Educate network administrators about this vulnerability and ensure strong credential management to prevent privilege escalation that could facilitate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T18:53:46.535Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb41a9e6bfc5ba1dadee2f

Added to database: 3/31/2026, 3:38:17 AM

Last enriched: 3/31/2026, 3:53:21 AM

Last updated: 3/31/2026, 4:46:58 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses