Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Totolink — Vulnerabilities & Security Advisories 430

Browse all 430 CVE security advisories affecting Totolink. AI-powered Chinese analysis, POCs, and references for each vulnerability.

TOTOLINK operates primarily as a manufacturer of consumer networking hardware, including wireless routers and range extenders, targeting residential and small business markets. Security audits reveal a significant volume of vulnerabilities, with 429 CVEs currently documented, indicating systemic issues in firmware development and code review processes. Historically, the most prevalent flaw classes include Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation bugs, often stemming from inadequate input validation and weak authentication mechanisms in web management interfaces. These defects frequently allow unauthenticated attackers to gain full administrative control or execute arbitrary commands on affected devices. While no single catastrophic global incident has been widely publicized, the sheer quantity of disclosed vulnerabilities suggests a consistent pattern of security negligence. Users are advised to exercise caution, as the vendor’s response to patching these critical flaws has been inconsistent, leaving many deployed units exposed to exploitation.

Found 17 results / 430Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-5679 Totolink A3300R cstecgi.cgi vsetTr069Cfg os command injection — A3300RCWE-78 5.5 Medium2026-04-06
CVE-2026-5178 Totolink A3300R cstecgi.cgi setIptvCfg command injection — A3300RCWE-77 6.3 Medium2026-03-31
CVE-2026-5177 Totolink A3300R cstecgi.cgi setWiFiBasicCfg command injection — A3300RCWE-77 6.3 Medium2026-03-31
CVE-2026-5176 Totolink A3300R cstecgi.cgi setSyslogCfg command injection — A3300RCWE-77 7.3 High2026-03-31
CVE-2026-5105 Totolink A3300R Parameter cstecgi.cgi setVpnPassCfg command injection — A3300RCWE-77 6.3 Medium2026-03-30
CVE-2026-5104 Totolink A3300R cstecgi.cgi setStaticRoute command injection — A3300RCWE-77 6.3 Medium2026-03-30
CVE-2026-5103 Totolink A3300R cstecgi.cgi setUPnPCfg command injection — A3300RCWE-77 6.3 Medium2026-03-30
CVE-2026-5102 Totolink A3300R Parameter cstecgi.cgi setSmartQosCfg command injection — A3300RCWE-77 6.3 Medium2026-03-30
CVE-2026-5101 Totolink A3300R Parameter cstecgi.cgi setLanCfg command injection — A3300RCWE-77 6.3 Medium2026-03-29
CVE-2025-12260 TOTOLINK A3300R POST Parameter cstecgi.cgi setSyslogCfg stack-based overflow — A3300RCWE-121 8.8 High2025-10-27
CVE-2025-12259 TOTOLINK A3300R POST Parameter cstecgi.cgi setScheduleCfg stack-based overflow — A3300RCWE-121 8.8 High2025-10-27
CVE-2025-12258 TOTOLINK A3300R POST Parameter cstecgi.cg setOpModeCfg stack-based overflow — A3300RCWE-121 8.8 High2025-10-27
CVE-2025-12241 TOTOLINK A3300R POST Parameter cstecgi.cgi setLanguageCfg stack-based overflow — A3300RCWE-121 8.8 High2025-10-27
CVE-2025-12240 TOTOLINK A3300R cstecgi.cgi setDmzCfg buffer overflow — A3300RCWE-120 8.8 High2025-10-27
CVE-2025-12239 TOTOLINK A3300R cstecgi.cgi setDdnsCfg buffer overflow — A3300RCWE-120 8.8 High2025-10-27
CVE-2024-7331 TOTOLINK A3300R cstecgi.cgi UploadCustomModule buffer overflow — A3300RCWE-120 8.8 High2024-08-01
CVE-2024-7155 TOTOLINK A3300R shadow.sample hard-coded password — A3300RCWE-259 2.5 Low2024-07-28

This page lists every published CVE security advisory associated with Totolink. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.