


Perceptive Security
SOC/SIEM Consultancy

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMaxAlive parameter to /…
Published:
22 april 2026 om 22:00:00
Alert date:
23 april 2026 om 20:03:43
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A command injection vulnerability was discovered in ToToLink A3300R firmware version v17.0.0cu.557_B20221024. The vulnerability allows attackers to execute arbitrary commands through the stunMaxAlive parameter when making requests to the /cgi-bin/cstecgi.cgi endpoint. This represents a critical security flaw that could enable remote code execution on affected router devices. The vulnerability has been documented with proof-of-concept code available on GitHub, indicating potential for exploitation in the wild.
Technical details
Mitigation steps:
Affected products:
ToToLink A3300R
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31178
https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-max-alive-cmd-injection
Related CVE's:
Related threat actors:
IOC's:
/cgi-bin/cstecgi.cgi, stunMaxAlive
This article was created with the assistance of AI technology by Perceptive.
