CVE-2026-31178

ToToLink · A3300R

The ToToLink A3300R firmware contains a command injection vulnerability in the stunMaxAlive parameter, allowing unauthenticated remote code execution.

Executive summary

A critical remote command execution vulnerability in ToToLink A3300R firmware allows unauthenticated attackers to gain full control of the device via manipulated CGI parameters.

Vulnerability

This is a command injection vulnerability within the /cgi-bin/cstecgi.cgi endpoint. The stunMaxAlive parameter lacks adequate sanitization, allowing an unauthenticated attacker to execute arbitrary system-level commands.

Business impact

With a CVSS score of 9.8, this flaw poses a severe threat to network infrastructure. Successful exploitation results in full administrative control of the router, potentially allowing attackers to facilitate man-in-the-middle attacks or establish persistent persistence within the network.

Remediation

Immediate Action: Update the affected ToToLink A3300R firmware to the latest version, which contains fixes for this command injection vulnerability.

Proactive Monitoring: Monitor the router for unauthorized configuration changes or unexpected traffic patterns that deviate from normal baseline behavior.

Compensating Controls: Disable remote administrative access to the router and restrict access to the management interface to trusted internal networks.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability is critical and requires immediate attention. Organizations using the ToToLink A3300R must verify their firmware versions and apply the necessary patches to protect the network perimeter from unauthorized remote access.