A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/TOTOLINK-NR1800X-setWanCfg-2e453a41781f80b390f3e1ce0d9dd5b9?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.342302 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342302 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.735787 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-22 15:16
Updated : 2026-01-29 17:50
NVD link : CVE-2026-1326
Mitre link : CVE-2026-1326
CVE.ORG link : CVE-2026-1326
JSON object : View
Products Affected
totolink
- nr1800x
- nr1800x_firmware
