A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Management Interface. Performing a manipulation of the argument webWlanIdx results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink n300rh
CPEs cpe:2.3:h:totolink:n300rh:4.0:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n300rh_firmware:6.1c.1349_b20181018:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n300rh_firmware:6.1c.1353_b20190305:*:*:*:*:*:*:*
Vendors & Products Totolink n300rh

Fri, 27 Feb 2026 05:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Management Interface. Performing a manipulation of the argument webWlanIdx results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink N300RH Web Management cstecgi.cgi setWebWlanIdx os command injection
First Time appeared Totolink
Totolink n300rh Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink n300rh Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-02-27T05:32:15.135Z

Updated: 2026-02-27T18:53:12.387Z

Reserved: 2026-02-26T20:33:00.808Z

Link: CVE-2026-3301

cve-icon Vulnrichment

Updated: 2026-02-27T18:53:09.084Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T06:18:00.480

Modified: 2026-02-27T15:36:49.730

Link: CVE-2026-3301

cve-icon Redhat

No data.