Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:totolink:lr350_firmware:*:*:*:*:*:*:*:* |
Thu, 29 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink lr350 Firmware
|
|
| CPEs | cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink lr350 Firmware
|
Tue, 20 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink lr350 |
|
| Vendors & Products |
Totolink
Totolink lr350 |
Mon, 19 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Totolink LR350 9.3.5u.6369_B20220309. This affects the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ssid leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. | |
| Title | Totolink LR350 cstecgi.cgi setWiFiEasyCfg buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:46:34.104Z
Reserved: 2026-01-18T20:19:59.156Z
Link: CVE-2026-1157
Updated: 2026-01-20T21:32:27.592Z
Status : Analyzed
Published: 2026-01-19T14:15:50.140
Modified: 2026-01-29T18:36:21.287
Link: CVE-2026-1157
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:15:15Z