PT-2026-36794 · Totolink · N300Rh

Wxhwxhwxh_Mie

·

Published

2026-05-04

·

Updated

2026-05-04

·

CVE-2026-7749

CVSS v2.0

9.0

High

VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Totolink N300RH version 3.2.4-B20220812
Description A buffer overflow can be triggered remotely via the POST Request Handler component. The issue exists within the setWanConfig() function located in the '/cgi-bin/cstecgi.cgi' endpoint when manipulating the priDns argument.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability. As a temporary workaround, restrict access to the '/cgi-bin/cstecgi.cgi' endpoint or avoid using the priDns argument within the setWanConfig() function.

Exploit

Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-7749

Affected Products

N300Rh