CVE-2026-31175

ToToLink · A3300R

The ToToLink A3300R firmware contains a command injection vulnerability in the stunEnable parameter, allowing unauthenticated remote code execution.

Executive summary

A critical remote command execution vulnerability in ToToLink A3300R firmware allows unauthenticated attackers to gain full control of the device via manipulated CGI parameters.

Vulnerability

This is a command injection vulnerability located in the /cgi-bin/cstecgi.cgi endpoint. Unauthenticated attackers can inject arbitrary system commands into the stunEnable parameter.

Business impact

The 9.8 CVSS score reflects the extreme risk posed by this vulnerability. Remote code execution on networking hardware allows an attacker to pivot into the internal network, intercept traffic, or use the device as a node in a botnet, causing significant operational disruption.

Remediation

Immediate Action: Update the A3300R firmware to the latest available version provided by ToToLink that addresses this command injection flaw.

Proactive Monitoring: Monitor internal network traffic for anomalous outbound connections originating from the router that may indicate command-and-control activity.

Compensating Controls: If patching is delayed, isolate the device management interface from the public internet using firewall rules or ACLs to prevent remote access.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Immediate firmware updates are required for all affected ToToLink routers. If updates are unavailable, the device must be disconnected from external networks or restricted to trusted administrative IPs until a secure patch is applied.