<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>N300RH 3.2.4-B20220812 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/n300rh-3.2.4-b20220812/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 10:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/n300rh-3.2.4-b20220812/feed.xml" rel="self" type="application/rss+xml"/><item><title>Totolink N300RH Buffer Overflow Vulnerability in setWanConfig</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setWanConfig</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. An attacker can exploit this vulnerability by manipulating the <code>priDns</code> argument in a crafted POST request. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the device. Public exploits for this vulnerability are already available, increasing the risk of exploitation. This vulnerability was published on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>priDns</code> argument with a value exceeding the buffer size.</li>
<li>The <code>setWanConfig</code> function processes the <code>priDns</code> argument without proper bounds checking.</li>
<li>The oversized <code>priDns</code> value overwrites adjacent memory on the stack, potentially including control flow data.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining a shell.</li>
<li>The attacker could then use the compromised router to perform lateral movement, exfiltrate data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the Totolink N300RH router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a pivot point to attack other devices on the network. Given that public exploits are available, a wide range of attackers could potentially exploit this vulnerability. The CVSS v3.1 base score is 8.8 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with abnormally long <code>priDns</code> values to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect and block malicious POST requests targeting <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Contact Totolink for a security patch or firmware update to address CVE-2026-7749.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve-2026-7749</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item></channel></rss>