CVE-2026-7747

Totolink · N300RH

A remote buffer overflow vulnerability in the Totolink N300RH login authentication function allows attackers to crash the system or execute arbitrary code.

Executive summary

A critical remote buffer overflow vulnerability in Totolink N300RH allows unauthenticated attackers to execute arbitrary code via the password field.

Vulnerability

The loginauth function within /cgi-bin/cstecgi.cgi contains a buffer overflow vulnerability triggered by an overly long input in the Password argument. This allows for remote, unauthenticated exploitation.

Business impact

A CVSS score of 9.8 reflects the high risk of remote code execution (RCE) on network infrastructure. Successful exploitation could lead to full device compromise, allowing attackers to intercept network traffic, pivot into internal networks, or render the device unusable, causing significant operational downtime.

Remediation

Immediate Action: Apply the vendor-provided firmware update immediately. If no update is available, restrict management interface access to trusted IP ranges.

Proactive Monitoring: Monitor device logs for unexpected reboots or service crashes, which may indicate failed or successful overflow attempts.

Compensating Controls: Disable remote management interfaces on the device and ensure it is not exposed directly to the internet.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Due to the availability of public exploits and the critical nature of the RCE, this vulnerability represents an urgent security risk. Organizations using the Totolink N300RH must isolate the device or apply the latest firmware to prevent unauthorized access and potential system takeover.