Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-7747 | 9.8 CRITICAL | Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow |
| CVE-2026-7719 | 9.8 CRITICAL | Totolink WA300 POST Request cstecgi.cgi loginauth buffer overflow |
| CVE-2026-7750 | 8.8 HIGH | Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow |
| CVE-2026-7749 | 8.8 HIGH | Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow |
| CVE-2026-7748 | 8.8 HIGH | Totolink N300RH POST Request cstecgi.cgi setUpgradeFW buffer overflow |
| CVE-2026-7717 | 8.8 HIGH | Totolink WA300 POST Request cstecgi.cgi UploadCustomModule buffer overflow |
| CVE-2026-7721 | 6.3 MEDIUM | Totolink WA300 cstecgi.cgi NTPSyncWithHost command injection |
| CVE-2026-7720 | 6.3 MEDIUM | Totolink WA300 POST Request cstecgi.cgi setLanguageCfg command injection |
No comments yet