A vulnerability was identified in Totolink LR350 9.3.5u.6369_B20220309. This affects the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ssid leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/TOTOLINK-LR350-setWiFiEasyCfg-2e453a41781f80b7b53cef33c6a782aa?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.341751 | Permissions Required VDB Entry |
| https://vuldb.com/?id.341751 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.735726 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-19 14:15
Updated : 2026-01-29 18:36
NVD link : CVE-2026-1157
Mitre link : CVE-2026-1157
CVE.ORG link : CVE-2026-1157
JSON object : View
Products Affected
totolink
- lr350
- lr350_firmware
