Cyber Posture

CVE-2026-7748

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 22.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument FileName can lead to buffer overflow. The…

more

attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the buffer overflow flaw in the setUpgradeFW function of the Totolink N300RH firmware by identifying, testing, and deploying patches.

prevent

Requires validation of the FileName argument in POST requests to the /cgi-bin/cstecgi.cgi handler to prevent buffer overflows from malformed inputs.

prevent

Implements memory safeguards such as stack canaries or DEP to protect against code execution from the buffer overflow exploitation.

Security SummaryAI

CVE-2026-7748 is a buffer overflow vulnerability affecting the Totolink N300RH router on firmware version 3.2.4-B20220812, published on 2026-05-04. The flaw resides in the setUpgradeFW function within the /cgi-bin/cstecgi.cgi file, part of the POST Request Handler component. Manipulating the FileName argument triggers the buffer overflow, classified under CWE-119 and CWE-120.

The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity and low privileges required, without user interaction. An attacker with low-privilege access can achieve high impacts on confidentiality, integrity, and availability, potentially leading to remote code execution via the buffer overflow.

Advisories and further details are documented in references such as VulDB entries (vuldb.com/vuln/360923 and related pages) and a public exploit proof-of-concept at lavender-bicycle-a5a.notion.site/TOTOLINK-N300RH-setUpgradeFW-34553a41781f80abb1d1c627d7ff4329. The vendor site at www.totolink.net provides additional context.

The exploit has been made publicly available and could be used for attacks.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in the router's internet-facing CGI endpoint (/cgi-bin/cstecgi.cgi setUpgradeFW) directly enables remote code execution against a public-facing application with no user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References