Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink wa300
|
|
| Vendors & Products |
Totolink wa300
|
Mon, 04 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Executing a manipulation of the argument File can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. | |
| Title | Totolink WA300 POST Request cstecgi.cgi UploadCustomModule buffer overflow | |
| First Time appeared |
Totolink
Totolink wa300 Firmware |
|
| Weaknesses | CWE-119 CWE-120 |
|
| CPEs | cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink wa300 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T11:33:35.250Z
Reserved: 2026-05-03T08:09:22.039Z
Link: CVE-2026-7717
Updated: 2026-05-04T11:33:28.454Z
Status : Deferred
Published: 2026-05-04T01:16:05.380
Modified: 2026-05-04T15:18:40.077
Link: CVE-2026-7717
No data.
OpenCVE Enrichment
Updated: 2026-05-04T03:30:35Z