{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1150","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-18T13:55:32.781Z","datePublished":"2026-01-19T10:32:07.749Z","dateUpdated":"2026-02-23T08:45:01.041Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:45:01.041Z"},"title":"Totolink LR350 POST Request cstecgi.cgi setTracerouteCfg command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Totolink","product":"LR350","versions":[{"version":"9.3.5u.6369_B20220309","status":"affected"}],"cpes":["cpe:2.3:o:totolink:lr350_firmware:*:*:*:*:*:*:*:*"],"modules":["POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Totolink LR350 9.3.5u.6369_B20220309. Impacted is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument command results in command injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-29T21:34:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wxhwxhwxh_tutu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.341743","name":"VDB-341743 | Totolink LR350 POST Request cstecgi.cgi setTracerouteCfg command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.341743","name":"VDB-341743 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.735696","name":"Submit #735696 | TOTOLINK LR350 LR350 V9.3.5u.6369_B20220309 Command Injection","tags":["third-party-advisory"]},{"url":"https://lavender-bicycle-a5a.notion.site/TOTOLINK-LR350-setTracerouteCfg-2e453a41781f803494e3e4161a393487?source=copy_link","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-20T21:27:46.672016Z","id":"CVE-2026-1150","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-20T21:27:53.120Z"}}]}}