CVE-2026-4497
Published: 20 March 2026
Description
A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected by this issue is the function recvUpgradeNewFw of the file /cgi-bin/cstecgi.cgi. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and…
more
may be utilized.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates OS command injection by requiring validation of untrusted inputs to the vulnerable recvUpgradeNewFw function in cstecgi.cgi.
Ensures timely identification, reporting, and patching of the specific command injection flaw in Totolink WA300 firmware version 5.2cu.7112_B20190227.
Protects publicly accessible router web interfaces like the vulnerable CGI endpoint from unauthorized remote access and malicious code execution via command injection.
Security SummaryAI
CVE-2026-4497 is an OS command injection vulnerability (CWE-77, CWE-78) in the Totolink WA300 router firmware version 5.2cu.7112_B20190227. The flaw affects the recvUpgradeNewFw function in the /cgi-bin/cstecgi.cgi file, enabling attackers to inject operating system commands through manipulated input.
The vulnerability allows remote exploitation without authentication or user interaction, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Any network-accessible attacker can trigger the issue, achieving partial impacts on confidentiality, integrity, and availability via arbitrary command execution on the device.
Advisories from VulDB and GitHub references, including a proof-of-concept exploit ZIP file, confirm the vulnerability's details and public disclosure. No vendor patches or specific mitigations are outlined in the provided sources.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables unauthenticated remote exploitation of a public-facing web application (router CGI) for arbitrary OS command execution on a network device CLI.