Vulnerability Description
A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3300R Firmware | 17.0.0cu.557_b20221024 |
| Totolink | A3300R | - |
Related Weaknesses (CWE)
References
- https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_enable_cmd_iExploitThird Party Advisory
- https://vuldb.com/submit/779140Permissions RequiredVDB Entry
- https://vuldb.com/vuln/354128Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/354128/ctiThird Party AdvisoryVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2026-5103?
CVE-2026-5103 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes c...
How severe is CVE-2026-5103?
CVE-2026-5103 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5103?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3300R Firmware, Totolink A3300R.