{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0731","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-08T15:15:42.592Z","datePublished":"2026-01-08T23:02:10.447Z","dateUpdated":"2026-02-23T08:24:32.636Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:24:32.636Z"},"title":"TOTOLINK WA1200 HTTP Request cstecgi.cgi null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"TOTOLINK","product":"WA1200","versions":[{"version":"5.9c.2914","status":"affected"}],"modules":["HTTP Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-01-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-29T21:08:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"JackWesley (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.340128","name":"VDB-340128 | TOTOLINK WA1200 HTTP Request cstecgi.cgi null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.340128","name":"VDB-340128 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.733249","name":"Submit #733249 | TOTOLINK WA1200 V5.9c.2914 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://github.com/JackWesleyy/CVE/blob/main/WA1200/TOTOLINK%20WA1200%20NULL%20Pointer%20Dereference%20Vulnerability.md","tags":["related"]},{"url":"https://github.com/JackWesleyy/CVE/blob/main/WA1200/TOTOLINK%20WA1200%20NULL%20Pointer%20Dereference%20Vulnerability.md#poc","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-09T16:23:15.368638Z","id":"CVE-2026-0731","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-09T16:23:30.110Z"}}]}}