Vulnerability Description
A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://lavender-bicycle-a5a.notion.site/TOTOLINK-WA300-loginAuth-34553a41781f80
- https://vuldb.com/submit/807197
- https://vuldb.com/vuln/360895
- https://vuldb.com/vuln/360895/cti
- https://www.totolink.net/
FAQ
What is CVE-2026-7719?
CVE-2026-7719 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The m...
How severe is CVE-2026-7719?
CVE-2026-7719 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-7719?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.