A3300r Firmware Totolink A3300r Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink A3300r Firmware.

By the Year

In 2025 there have been 0 vulnerabilities in Totolink A3300r Firmware. Last year, in 2024 A3300r Firmware had 6 security vulnerabilities published. Right now, A3300r Firmware is on track to have less security vulnerabilities in 2025 than it did last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 6 8.78
2023 3 9.03
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new A3300r Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink A3300r Firmware Security Vulnerabilities

A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical

CVE-2024-7331 8.8 - High - August 01, 2024

A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. Affected by this issue is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Classic Buffer Overflow

A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as problematic

CVE-2024-7155 4.7 - Medium - July 28, 2024

A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-272569 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Use of Hard-coded Credentials

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability

CVE-2024-24328 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setMacFilterRules function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability

CVE-2024-24326 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the arpEnable parameter in the setStaticDhcpRules function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability

CVE-2024-23057 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability

CVE-2024-23058 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pass parameter in the setTr069Cfg function.

Shell injection

In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter

CVE-2023-46993 9.8 - Critical - October 31, 2023

In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter, which can lead to command injection.

Command Injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 is vulnerable to Incorrect Access Control

CVE-2023-46992 7.5 - High - October 31, 2023

TOTOLINK A3300R V17.0.0cu.557_B20221024 is vulnerable to Incorrect Access Control. Attackers are able to reset serveral critical passwords without authentication by visiting specific pages.

TOTOLINK A3300R 17.0.0cu.557_B20221024 contains a command injection

CVE-2023-46976 9.8 - Critical - October 31, 2023

TOTOLINK A3300R 17.0.0cu.557_B20221024 contains a command injection via the file_name parameter in the UploadFirmwareFile function.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink A3300r Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe