CVE-2026-1158

8.8 HIGH

📋 TL;DR

A remote buffer overflow vulnerability in Totolink LR350 routers allows attackers to execute arbitrary code by sending specially crafted POST requests to the setWizardCfg function. This affects Totolink LR350 routers running firmware version 9.3.5u.6369_B20220309. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Totolink LR350
Versions: 9.3.5u.6369_B20220309
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable CGI endpoint is typically accessible via web interface on port 80/443. Default configurations expose this to network access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, creation of persistent backdoors, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept network traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict ingress filtering or if vulnerable interfaces are not internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available, making this easily weaponizable. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Check Totolink website for firmware updates. 2. Download latest firmware for LR350. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Totolink LR350 routers from internet and restrict access to management interface

Access Control Lists

linux

Implement firewall rules to block external access to router web interface (ports 80, 443, 8080)

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
iptables -A INPUT -p tcp --dport 8080 -j DROP

🧯 If You Can't Patch

  • Replace vulnerable Totolink LR350 routers with patched or alternative devices
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface or using curl: curl -s http://router-ip/cgi-bin/cstecgi.cgi

Check Version:

curl -s http://router-ip/ | grep -i firmware || ssh admin@router-ip 'cat /etc/version'

Verify Fix Applied:

Verify firmware version is newer than 9.3.5u.6369_B20220309 and test if vulnerable endpoint responds to exploitation attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/cstecgi.cgi with setWizardCfg parameter
  • Large payloads in HTTP requests to router interface
  • Router configuration changes without authorized user activity

Network Indicators:

  • Multiple failed exploitation attempts to router CGI endpoints
  • Unusual outbound connections from router to unknown IPs
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router-logs" AND (uri="/cgi-bin/cstecgi.cgi" AND method="POST" AND params="setWizardCfg")

🔗 References

📤 Share & Export