Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink n300rh
|
|
| Vendors & Products |
Totolink n300rh
|
Mon, 04 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument Password results in buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. | |
| Title | Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow | |
| First Time appeared |
Totolink
Totolink n300rh Firmware |
|
| Weaknesses | CWE-119 CWE-120 |
|
| CPEs | cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink n300rh Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T12:43:29.421Z
Reserved: 2026-05-03T17:20:44.653Z
Link: CVE-2026-7747
Updated: 2026-05-04T12:43:25.211Z
Status : Deferred
Published: 2026-05-04T09:16:01.117
Modified: 2026-05-04T15:17:58.710
Link: CVE-2026-7747
No data.
OpenCVE Enrichment
Updated: 2026-05-04T09:30:42Z