{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5103","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-29T17:50:50.164Z","datePublished":"2026-03-30T01:00:20.917Z","dateUpdated":"2026-03-30T11:26:52.093Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-30T01:00:20.917Z"},"title":"Totolink A3300R cstecgi.cgi setUPnPCfg command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Totolink","product":"A3300R","versions":[{"version":"17.0.0cu.557_b20221024","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a3300r_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-29T19:56:09.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LvHW (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/354128","name":"VDB-354128 | Totolink A3300R cstecgi.cgi setUPnPCfg command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/354128/cti","name":"VDB-354128 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/779140","name":"Submit #779140 | Totolink A3300R 17.0.0cu.557_b20221024 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_enable_cmd_inject","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-30T11:25:01.228942Z","id":"CVE-2026-5103","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-30T11:26:52.093Z"}}]}}