Vulnerability Description
A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | Wa300 Firmware | 5.2cu.7112_b20190227 |
| Totolink | Wa300 | - |
Related Weaknesses (CWE)
References
- https://github.com/master-abc/cve/issues/36ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.344869Permissions RequiredVDB Entry
- https://vuldb.com/?id.344869Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.752063Third Party AdvisoryVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2026-2167?
CVE-2026-2167 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results...
How severe is CVE-2026-2167?
CVE-2026-2167 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2167?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink Wa300 Firmware, Totolink Wa300.