Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

TOTOLINK — Vulnerabilities & Security Advisories 430

Browse all 430 CVE security advisories affecting TOTOLINK. AI-powered Chinese analysis, POCs, and references for each vulnerability.

TOTOLINK operates primarily as a manufacturer of consumer networking hardware, including wireless routers and range extenders, targeting residential and small business markets. Security audits reveal a significant volume of vulnerabilities, with 429 CVEs currently documented, indicating systemic issues in firmware development and code review processes. Historically, the most prevalent flaw classes include Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation bugs, often stemming from inadequate input validation and weak authentication mechanisms in web management interfaces. These defects frequently allow unauthenticated attackers to gain full administrative control or execute arbitrary commands on affected devices. While no single catastrophic global incident has been widely publicized, the sheer quantity of disclosed vulnerabilities suggests a consistent pattern of security negligence. Users are advised to exercise caution, as the vendor’s response to patching these critical flaws has been inconsistent, leaving many deployed units exposed to exploitation.

Found 13 results / 430Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-7750 Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow — N300RHCWE-120 8.8 High2026-05-04
CVE-2026-7749 Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow — N300RHCWE-120 8.8 High2026-05-04
CVE-2026-7748 Totolink N300RH POST Request cstecgi.cgi setUpgradeFW buffer overflow — N300RHCWE-120 8.8 High2026-05-04
CVE-2026-7747 Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow — N300RHCWE-120 9.8 Critical2026-05-04
CVE-2026-7633 Totolink N300RH cstecgi.cgi setUploadSetting file inclusion — N300RHCWE-73 6.5 Medium2026-05-02
CVE-2026-6158 Totolink N300RH upgrade.so setUpgradeUboot os command injection — N300RHCWE-78 7.3 High2026-04-13
CVE-2026-3696 Totolink N300RH CGI cstecgi.cgi setWiFiWpsConfig os command injection — N300RHCWE-78 7.3 High2026-03-08
CVE-2026-3301 Totolink N300RH Web Management cstecgi.cgi setWebWlanIdx os command injection — N300RHCWE-78 9.8 Critical2026-02-27
CVE-2025-6401 TOTOLINK N300RH HTTP POST Message formFilter denial of service — N300RHCWE-404 3.5 Low2025-06-21
CVE-2025-6400 TOTOLINK N300RH HTTP POST Message formPortFw buffer overflow — N300RHCWE-120 8.8 High2025-06-21
CVE-2025-4851 TOTOLINK N300RH cstecgi.cgi setUploadUserData command injection — N300RHCWE-77 6.3 Medium2025-05-18
CVE-2025-4850 TOTOLINK N300RH cstecgi.cgi setUnloadUserData command injection — N300RHCWE-77 6.3 Medium2025-05-18
CVE-2025-4849 TOTOLINK N300RH cstecgi.cgi CloudACMunualUpdateUserdata command injection — N300RHCWE-77 6.3 Medium2025-05-18

This page lists every published CVE security advisory associated with TOTOLINK. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.