{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5101","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-29T17:50:43.221Z","datePublished":"2026-03-29T23:00:15.592Z","dateUpdated":"2026-03-30T14:52:01.775Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-29T23:00:15.592Z"},"title":"Totolink A3300R Parameter cstecgi.cgi setLanCfg command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Totolink","product":"A3300R","versions":[{"version":"17.0.0cu.557_b20221024","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a3300r_firmware:*:*:*:*:*:*:*:*"],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This affects the function setLanCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument lanIp leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-29T19:56:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHuster2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/354126","name":"VDB-354126 | Totolink A3300R Parameter cstecgi.cgi setLanCfg command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/354126/cti","name":"VDB-354126 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/779128","name":"Submit #779128 | Totolink A3300R 17.0.0cu.557_b20221024 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vul_db/blob/main/A3300R/vul_39/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-30T12:59:47.134999Z","id":"CVE-2026-5101","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-30T14:52:01.775Z"}}]}}