Cyber Posture

CVE-2026-7717

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 22.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument File can lead to buffer overflow. The attack can be…

more

launched remotely. The exploit has been publicly disclosed and may be utilized.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely remediation of identified flaws, directly addressing the buffer overflow in the UploadCustomModule function by applying patches or firmware updates.

prevent

SI-10 enforces input validation at entry points like the File argument in POST requests to /cgi-bin/cstecgi.cgi, preventing buffer overflow exploitation.

prevent

SI-16 implements memory protections such as ASLR and DEP that mitigate exploitation of the buffer overflow vulnerability for remote code execution.

Security SummaryAI

CVE-2026-7717 is a buffer overflow vulnerability affecting the Totolink WA300 router on firmware version 5.2cu.7112_B20190227. The flaw exists in the UploadCustomModule function within the /cgi-bin/cstecgi.cgi file, which is part of the POST Request Handler component. It is triggered by manipulating the File argument in a request.

The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), associated with CWE-119 and CWE-120. A remote attacker with low privileges can exploit it over the network with low attack complexity and no user interaction. Successful exploitation results in high impacts to confidentiality, integrity, and availability, enabling potential remote code execution.

Advisories and references, including a Notion site detailing the exploit, VulDB entries (vuln/360893 and related CTI/submit pages), and the Totolink vendor site, confirm the issue was published on 2026-05-04. The exploit has been publicly disclosed and may be utilized, though no specific patch or mitigation steps are detailed in the provided information.

The vulnerability's public exploit disclosure increases the risk of active exploitation against unpatched Totolink WA300 devices.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in authenticated web CGI handler (UploadCustomModule) on network-exposed router enables RCE from low-priv credentials, directly mapping to authenticated exploitation for privilege escalation (T1068) and exploitation of public-facing applications (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References