PT-2026-36794 · Totolink · N300Rh
Wxhwxhwxh_Mie
·
Published
2026-05-04
·
Updated
2026-05-04
·
CVE-2026-7749
CVSS v2.0
9.0
High
| Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Totolink N300RH version 3.2.4-B20220812
Description
A buffer overflow can be triggered remotely via the POST Request Handler component. The issue exists within the
setWanConfig() function located in the '/cgi-bin/cstecgi.cgi' endpoint when manipulating the priDns argument.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
As a temporary workaround, restrict access to the '/cgi-bin/cstecgi.cgi' endpoint or avoid using the
priDns argument within the setWanConfig() function.Exploit
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
N300Rh