Lr350 Firmware

6 CVEs product

Monthly

CVE-2026-1158 HIGH POC This Week

Buffer overflow in Totolik LR350 firmware allows authenticated remote attackers to achieve full system compromise through malicious SSID parameters in the wizard configuration endpoint. Public exploit code is available for this vulnerability, and no patch has been released, leaving deployed devices at immediate risk. The flaw requires valid credentials but enables complete confidentiality, integrity, and availability violations with network-level access.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1157 HIGH POC This Week

Stack-based buffer overflow in Totolink LR350 firmware (version 9.3.5u.6369_B20220309) allows authenticated remote attackers to achieve complete system compromise through manipulation of the ssid parameter in the WiFi configuration function. Public exploit code is available and no patch has been released, leaving affected devices vulnerable to active exploitation. The vulnerability requires valid credentials but poses critical risk due to high-impact consequences including arbitrary code execution.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1156 HIGH POC This Week

Unauthenticated remote attackers can exploit a buffer overflow in the WiFi configuration function of Totolink LR350 firmware version 9.3.5u.6369_B20220309 to achieve remote code execution with full system compromise. The vulnerability exists in the ssid parameter handler of /cgi-bin/cstecgi.cgi and requires only network access to trigger, with public exploit code already available. No patch is currently available for affected devices.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1155 HIGH POC This Week

Buffer overflow in Totolink LR350 firmware allows authenticated remote attackers to achieve complete system compromise through a malformed SSID parameter in the WiFi guest configuration function. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with network access and valid credentials can execute arbitrary code with full system privileges.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1150 MEDIUM POC This Month

Command injection in Totolik LR350 firmware through the setTracerouteCfg function allows authenticated remote attackers to execute arbitrary system commands via a malicious POST request to /cgi-bin/cstecgi.cgi. Public exploit code is available and the vulnerability remains unpatched, creating immediate risk for deployed devices. An attacker with network access and valid credentials can achieve code execution with full device compromise potential.

Command Injection Lr350 Firmware
NVD VulDB
CVSS 3.1
6.3
EPSS
2.7%
CVE-2026-1149 MEDIUM POC This Month

Command injection in Totolink LR350 firmware allows authenticated remote attackers to execute arbitrary commands through the ip parameter in the setDiagnosisCfg function. Public exploit code exists for this vulnerability, and no patch is currently available. Affected users should restrict access to the affected device until a fix is released.

Command Injection Lr350 Firmware
NVD VulDB
CVSS 3.1
6.3
EPSS
2.7%
CVE-2026-1158
EPSS 0% CVSS 8.8
HIGH POC This Week

Buffer overflow in Totolik LR350 firmware allows authenticated remote attackers to achieve full system compromise through malicious SSID parameters in the wizard configuration endpoint. Public exploit code is available for this vulnerability, and no patch has been released, leaving deployed devices at immediate risk. The flaw requires valid credentials but enables complete confidentiality, integrity, and availability violations with network-level access.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVE-2026-1157
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in Totolink LR350 firmware (version 9.3.5u.6369_B20220309) allows authenticated remote attackers to achieve complete system compromise through manipulation of the ssid parameter in the WiFi configuration function. Public exploit code is available and no patch has been released, leaving affected devices vulnerable to active exploitation. The vulnerability requires valid credentials but poses critical risk due to high-impact consequences including arbitrary code execution.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVE-2026-1156
EPSS 0% CVSS 8.8
HIGH POC This Week

Unauthenticated remote attackers can exploit a buffer overflow in the WiFi configuration function of Totolink LR350 firmware version 9.3.5u.6369_B20220309 to achieve remote code execution with full system compromise. The vulnerability exists in the ssid parameter handler of /cgi-bin/cstecgi.cgi and requires only network access to trigger, with public exploit code already available. No patch is currently available for affected devices.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVE-2026-1155
EPSS 0% CVSS 8.8
HIGH POC This Week

Buffer overflow in Totolink LR350 firmware allows authenticated remote attackers to achieve complete system compromise through a malformed SSID parameter in the WiFi guest configuration function. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with network access and valid credentials can execute arbitrary code with full system privileges.

Buffer Overflow Lr350 Firmware
NVD VulDB
CVE-2026-1150
EPSS 3% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolik LR350 firmware through the setTracerouteCfg function allows authenticated remote attackers to execute arbitrary system commands via a malicious POST request to /cgi-bin/cstecgi.cgi. Public exploit code is available and the vulnerability remains unpatched, creating immediate risk for deployed devices. An attacker with network access and valid credentials can achieve code execution with full device compromise potential.

Command Injection Lr350 Firmware
NVD VulDB
CVE-2026-1149
EPSS 3% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolink LR350 firmware allows authenticated remote attackers to execute arbitrary commands through the ip parameter in the setDiagnosisCfg function. Public exploit code exists for this vulnerability, and no patch is currently available. Affected users should restrict access to the affected device until a fix is released.

Command Injection Lr350 Firmware
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy