Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink wa300
|
|
| Vendors & Products |
Totolink wa300
|
Mon, 04 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Totolink WA300 5.2cu.7112_B20190227. This affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument hostTime leads to command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. | |
| Title | Totolink WA300 cstecgi.cgi NTPSyncWithHost command injection | |
| First Time appeared |
Totolink
Totolink wa300 Firmware |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:o:totolink:wa300_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink wa300 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T17:50:11.917Z
Reserved: 2026-05-03T08:09:52.083Z
Link: CVE-2026-7721
Updated: 2026-05-04T16:36:25.500Z
Status : Deferred
Published: 2026-05-04T03:16:12.683
Modified: 2026-05-04T15:18:40.077
Link: CVE-2026-7721
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:15:14Z