A3300r Firmware Totolink A3300r Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink A3300r Firmware.

By the Year

In 2025 there have been 7 vulnerabilities in Totolink A3300r Firmware with an average score of 8.9 out of ten. Last year, in 2024 A3300r Firmware had 18 security vulnerabilities published. Right now, A3300r Firmware is on track to have less security vulnerabilities in 2025 than it did last year. Last year, the average CVE base score was greater by 0.50

Year Vulnerabilities Average Score
2025 7 8.94
2024 18 9.44
2023 4 9.23

It may take a day or so for new A3300r Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink A3300r Firmware Security Vulnerabilities

TOTOLINK A3300R 17.0.0cu.557_B20221024 POST Buffer Overflow in setSyslogCfg
CVE-2025-12260 8.8 - High - October 27, 2025

A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. Such manipulation of the argument enable leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Stack Overflow

Stack Buffer Overflow in TOTOLINK A3300R setScheduleCfg Remote
CVE-2025-12259 8.8 - High - October 27, 2025

A flaw has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. This manipulation of the argument recHour causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

Stack Overflow

Remote buffer overflow via SETOPMODE in TOTOLINK A3300R 17.0.0cu.557
CVE-2025-12258 8.8 - High - October 27, 2025

A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. Impacted is the function setOpModeCfg of the file /cgi-bin/cstecgi.cg of the component POST Parameter Handler. The manipulation of the argument opmode results in stack-based buffer overflow. The attack may be performed from remote.

Stack Overflow

TOTOLINK A3300R 17.0.0cu.557_B20221024 buf overflow in setLanguageCfg
CVE-2025-12241 8.8 - High - October 27, 2025

A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This impacts the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi of the component POST Parameter Handler. The manipulation of the argument lang results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

Stack Overflow

Buffer Overflow in TOTOLINK A3300R 17.0.0cu setDmzCfg CGI Remote
CVE-2025-12240 8.8 - High - October 27, 2025

A security vulnerability has been detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This affects the function setDmzCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

Classic Buffer Overflow

TOTOLINK A3300R 17.0.0cu Buffer Overflow in setDdnsCfg via cgi-bin/cstecgi.cgi
CVE-2025-12239 8.8 - High - October 27, 2025

A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The impacted element is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Executing manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

Classic Buffer Overflow

Command Injection in Totolink A3300R V17.0.0 sub_4197C0 via mac/desc
CVE-2025-52046 9.8 - Critical - July 17, 2025

Totolink A3300R V17.0.0cu.596_B20250515 was found to contain a command injection vulnerability in the sub_4197C0 function via the mac and desc parameters. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.

Command Injection

TOTOLINK A3300R CGI 'UploadCustomModule' Buffer Overflow CVE-2024-7331
CVE-2024-7331 8.8 - High - August 01, 2024

A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. Affected by this issue is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Classic Buffer Overflow

Hard-coded password in /etc/shadow.sample on TOTOLINK A3300R 17.0.0cu
CVE-2024-7155 4.7 - Medium - July 28, 2024

A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-272569 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Use of Hard-coded Credentials

TOTO-API RCE via setOpModeCfg on A3300R v17.0.0cu.557_B20221024
CVE-2024-27521 - March 26, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the "setOpModeCfg" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user "root").

Cmd Injection via enable in setMacFilterRules, TOTOLINK A3300R V17.0.0cu.557
CVE-2024-24328 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setMacFilterRules function.

Shell injection

Command Injection in TOTOLINK A3300R V17.0.0cu via arpEnable
CVE-2024-24326 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the arpEnable parameter in the setStaticDhcpRules function.

Shell injection

Command Injection in TOTOLINK A3300R V17 Via setParentalRules (enable)
CVE-2024-24325 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setParentalRules function.

Shell injection

Command Injection in TOTOLINK A3300R V17.0.0cu.557_B20221024 setPortForwardRules
CVE-2024-24329 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.

Shell injection

Cmd Inject in TOTOLINK A3300R V17 via desc param in setWiFiAclRules
CVE-2024-24333 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the desc parameter in the setWiFiAclRules function.

Shell injection

TOTOLINK A3300R v17.0.0cu.557 B20221024 cmd-injection via setRemoteCfg
CVE-2024-24330 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the port or enable parameter in the setRemoteCfg function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557 cmd-inj via URL in setUrlFilterRules
CVE-2024-24332 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the url parameter in the setUrlFilterRules function.

Shell injection

Command Injection in TOTOLINK A3300R V17.0.0cu.557 via pppoePass
CVE-2024-24327 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function.

Shell injection

Cmd Injection in TOTOLINK A3300R v17 via setWiFiScheduleCfg enable
CVE-2024-24331 9.8 - Critical - January 30, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setWiFiScheduleCfg function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 command injection via hostName
CVE-2024-22942 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the hostName parameter in the setWanCfg function.

Shell injection

Command Injection in TOTOLINK A3300R v17.0.0cu.557 via setDdnsCfg
CVE-2024-23059 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the username parameter in the setDdnsCfg function.

Shell injection

Command Injection in TOTOLINK A3300R 17.0.0cu.557 via setDmzCfg
CVE-2024-23060 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDmzCfg function.

Shell injection

TO TOTOLINK A3300R V17.x cmd injection via minute param
CVE-2024-23061 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the minute parameter in the setScheduleCfg function.

Shell injection

Command Injection via setTr069Cfg in TOTOLINK A3300R V17.0.0cu.557
CVE-2024-23058 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pass parameter in the setTr069Cfg function.

Shell injection

Cmd Injection in TOTOLINK A3300R NTP tz Param (V17.0.0cu.557_B20221024)
CVE-2024-23057 9.8 - Critical - January 11, 2024

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function.

Shell injection

TOTOLINK A3300R V17.0.0cu.557_B20221024 FoC: Unauthenticated Password Reset
CVE-2023-46992 7.5 - High - October 31, 2023

TOTOLINK A3300R V17.0.0cu.557_B20221024 is vulnerable to Incorrect Access Control. Attackers are able to reset serveral critical passwords without authentication by visiting specific pages.

Command Injection via setLedCfg in TOTOLINK A3300R v17.0.0cu.557
CVE-2023-46993 9.8 - Critical - October 31, 2023

In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter, which can lead to command injection.

Command Injection

Command Injection in TOTOLINK A3300R 17.0.0cu.557 UploadFirmwareFile
CVE-2023-46976 9.8 - Critical - October 31, 2023

TOTOLINK A3300R 17.0.0cu.557_B20221024 contains a command injection via the file_name parameter in the UploadFirmwareFile function.

Command Injection

TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection
CVE-2023-31729 9.8 - Critical - May 18, 2023

TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection via /cgi-bin/cstecgi.cgi.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink A3300r Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe