CVE-2026-2167Command Injection in Wa300

Severity
5.3MEDIUMNVD
EPSS
0.7%
top 28.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8

Description

A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/wa3005.2cu.7112_B20190227
NVDtotolink/wa300_firmware5.2cu.7112_b20190227

🔴Vulnerability Details

2
GHSA
GHSA-rm7q-jj78-qfc9: A vulnerability was detected in Totolink WA300 52026-02-08
CVEList
Totolink WA300 cstecgi.cgi setAPNetwork os command injection2026-02-08
CVE-2026-2167 — Command Injection in Totolink Wa300 | cvebase