Wa300 Firmware Totolink Wa300 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink Wa300 Firmware.

By the Year

In 2026 there have been 2 vulnerabilities in Totolink Wa300 Firmware with an average score of 6.3 out of ten.

Year Vulnerabilities Average Score
2026 2 6.30

It may take a day or so for new Wa300 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink Wa300 Firmware Security Vulnerabilities

Totolink WA300 Remote OS Command Injection via setAPNetwork (5.2cu.7112)
CVE-2026-2167 6.3 - Medium - February 08, 2026

A vulnerability was detected in Totolink WA300 5.2cu.7112_B20190227. The impacted element is the function setAPNetwork of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Ipaddr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.

Shell injection

TOTOLINK WA300 5.2cu.7112 cmd injection in cstecgi.cgi sub_401510
CVE-2026-0641 6.3 - Medium - January 06, 2026

A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink Wa300 Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe