CVE-2026-31178
ToToLink · A3300R
The ToToLink A3300R firmware contains a command injection vulnerability in the stunMaxAlive parameter, allowing unauthenticated remote code execution.
Executive summary
A critical remote command execution vulnerability in ToToLink A3300R firmware allows unauthenticated attackers to gain full control of the device via manipulated CGI parameters.
Vulnerability
This is a command injection vulnerability within the /cgi-bin/cstecgi.cgi endpoint. The stunMaxAlive parameter lacks adequate sanitization, allowing an unauthenticated attacker to execute arbitrary system-level commands.
Business impact
With a CVSS score of 9.8, this flaw poses a severe threat to network infrastructure. Successful exploitation results in full administrative control of the router, potentially allowing attackers to facilitate man-in-the-middle attacks or establish persistent persistence within the network.
Remediation
Immediate Action: Update the affected ToToLink A3300R firmware to the latest version, which contains fixes for this command injection vulnerability.
Proactive Monitoring: Monitor the router for unauthorized configuration changes or unexpected traffic patterns that deviate from normal baseline behavior.
Compensating Controls: Disable remote administrative access to the router and restrict access to the management interface to trusted internal networks.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability is critical and requires immediate attention. Organizations using the ToToLink A3300R must verify their firmware versions and apply the necessary patches to protect the network perimeter from unauthorized remote access.