CVE-2026-7747
CRITICALTotolink N300RH Parameter cstecgi.cgi loginauth buffer overflow
Title source: cnaDescription
A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument Password results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
References (5)
Core 5
Core References
Vdb Entry, Technical Description vdb-entry
technical-description
VDB-360922 | Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow
https://vuldb.com/vuln/360922
Signature, Permissions Required signature
permissions-required
VDB-360922 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/vuln/360922/cti
Third Party Advisory third-party-advisory
Submit #807201 | Totolink N300RH N300RH V3_Firmware V3.2.4-B20220812 Buffer Overflow
https://vuldb.com/submit/807201
Exploit exploit
https://lavender-bicycle-a5a.notion.site/TOTOLINK-N300RH-loginauth_password-34553a41781f80c0ad36f4d95122fd40?pvs=73
Product product
https://www.totolink.net/
Scores
CVSS v3
9.8
EPSS
0.0010
EPSS Percentile
27.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-119
CWE-120
Status
published
Products (1)
Totolink/N300RH
3.2.4-B20220812
Published
May 04, 2026
Tracked Since
May 04, 2026