Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:* |
Mon, 30 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink nr1800x
|
|
| Vendors & Products |
Totolink nr1800x
|
Sun, 29 Mar 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Totolink NR1800X Telnet Service cstecgi.cgi NTPSyncWithHost command injection | |
| First Time appeared |
Totolink
Totolink nr1800x Firmware |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:o:totolink:nr1800x_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink nr1800x Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-30T13:28:48.091Z
Reserved: 2026-03-27T15:55:59.708Z
Link: CVE-2026-5030
Updated: 2026-03-30T13:28:40.967Z
Status : Analyzed
Published: 2026-03-29T05:15:55.603
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5030
No data.
OpenCVE Enrichment
Updated: 2026-03-30T20:56:55Z