Vulnerability Description
A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | N300Rh Firmware | 6.1c.1353_b20190305 |
| Totolink | N300Rh | 4.0 |
Related Weaknesses (CWE)
References
- https://github.com/JXBbozaihuang/vuln-research/issues/2ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.349642Permissions RequiredVDB Entry
- https://vuldb.com/?id.349642Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.765681Third Party AdvisoryVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2026-3696?
CVE-2026-3696 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a man...
How severe is CVE-2026-3696?
CVE-2026-3696 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3696?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink N300Rh Firmware, Totolink N300Rh.