Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:* |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink wa300 Firmware
|
|
| CPEs | cpe:2.3:h:totolink:wa300:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:wa300_firmware:5.2cu.7112_b20190227:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink wa300 Firmware
|
Wed, 07 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink wa300 |
|
| Vendors & Products |
Totolink
Totolink wa300 |
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. | |
| Title | TOTOLINK WA300 cstecgi.cgi sub_401510 command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:21:20.676Z
Reserved: 2026-01-06T13:52:52.328Z
Link: CVE-2026-0641
Updated: 2026-01-06T19:20:30.244Z
Status : Analyzed
Published: 2026-01-06T19:16:07.573
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-0641
No data.
OpenCVE Enrichment
Updated: 2026-04-18T20:15:09Z