Critical (9.8)

CVE-2026-3301:

CVE-2026-3301

A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Managemen...

Overview

A critical security vulnerability has been identified in the Totolink N300RH wireless router, firmware version 6.1c.1353_B20190305. This flaw allows a remote attacker to execute arbitrary commands on the device, granting them full control.

Vulnerability Explanation

In simple terms, the router’s web-based management interface contains a flaw in a specific function (setWebWlanIdx). This function improperly processes user input related to Wi-Fi settings. By sending a specially crafted network request containing malicious commands within the webWlanIdx parameter, an attacker can trick the router into executing those commands on its underlying operating system. This is known as an Operating System (OS) Command Injection.

Impact and Risk

The impact of this vulnerability is severe. Since the attack can be performed remotely without authentication, an attacker anywhere on the internet could potentially:

  • Gain complete administrative control of the router.
  • Intercept, monitor, or redirect network traffic (data theft).
  • Install persistent malware or use the router as part of a botnet.
  • Change configuration settings to deny service to legitimate users.
  • Use the compromised router as a foothold to attack other devices on the local network.

With a maximum CVSS score of 9.8, this is a critical risk requiring immediate attention. Publicly available exploit code increases the likelihood of widespread attacks.

Remediation and Mitigation

Primary Action: Update Firmware

  1. Check for Updates: Immediately log into your Totolink N300RH web admin panel and navigate to the firmware update section.
  2. Apply Patch: Check the official Totolink website for a security update that addresses CVE-2026-3301. If an update is available, install it promptly. If no patch is available, proceed with the mitigations below and contact Totolink support to inquire about a fix.

Immediate Mitigations (If No Patch is Available):

  • Disable WAN Management: Ensure the router’s administrative interface is not accessible from the public internet (WAN). This setting is typically found under “Remote Management” or similar in the admin panel.
  • Use a Strong Admin Password: Change the default administrator password to a unique, complex passphrase.
  • Segment Your Network: Consider placing IoT and less trusted devices on a separate guest network, isolated from your main devices.
  • Monitor Network Traffic: Be alert for unusual outgoing connections or degraded performance from the router.

If patching is not possible, replacing the affected hardware with a supported model should be considered due to the high severity of this flaw.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.