Vulnerability Description
A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this issue is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument vlanPriLan3 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3300R Firmware | 17.0.0cu.557_b20221024 |
| Totolink | A3300R | - |
Related Weaknesses (CWE)
References
- https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_vlanPriLan3_ExploitThird Party Advisory
- https://vuldb.com/submit/779147Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/354246Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/354246/ctiPermissions RequiredVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2026-5178?
CVE-2026-5178 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this issue is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argume...
How severe is CVE-2026-5178?
CVE-2026-5178 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5178?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3300R Firmware, Totolink A3300R.