Skip to content

Add CVE-2026-5105 - Totolink A3300R OS command injection template#15725

Open
CEHCVKR wants to merge 3 commits intoprojectdiscovery:mainfrom
CEHCVKR:add-CVE-2026-5105
Open

Add CVE-2026-5105 - Totolink A3300R OS command injection template#15725
CEHCVKR wants to merge 3 commits intoprojectdiscovery:mainfrom
CEHCVKR:add-CVE-2026-5105

Conversation

@CEHCVKR
Copy link
Copy Markdown

@CEHCVKR CEHCVKR commented Mar 30, 2026

PR Information

Adds a new HTTP template for Totolink A3300R OS command injection in /cgi-bin/cstecgi.cgi via the pptpPassThru parameter.

Detection uses two-request timing validation:

  • Request 1: baseline (pptpPassThru=1)
  • Request 2: payload (pptpPassThru=$(sleep 7) URL-encoded)

Match conditions:

  • status_code_1 == 200
  • status_code_2 == 200
  • duration_1 < 4
  • duration_2 >= 7
  • (duration_2 - duration_1) >= 5

This helps reduce false positives versus single-request timing checks.

Template validation

  • Validated with a host running a vulnerable version and/or configuration (True Positive)
  • Validated with a host running a patched version and/or configuration (avoid False Positive)

Additional Details (leave it blank if not applicable)

  • Template syntax validated locally using:
    • nuclei -validate -duc -t http/cves/2026/CVE-2026-5105.yaml
  • Functional behavior tested in a local mock lab with debug mode.
  • verified: false is intentionally kept until validation on a confirmed real vulnerable target (and ideally a patched target).

Additional References:

@neo-by-projectdiscovery-dev
Copy link
Copy Markdown

neo-by-projectdiscovery-dev bot commented Mar 30, 2026

Neo - Nuclei Template Review

No security issues found

Hardening Notes
  • This increment contains only a merge commit with no substantive changes to the PR content
  • The CVE-2026-5105 template remains in the same state as the initial commit dc645f6
  • Any concerns from the previous review (authentication metadata, timeout directive, verification status) remain unaddressed

Comment @pdneo help for available commands. · Open in Neo

@CEHCVKR
Copy link
Copy Markdown
Author

CEHCVKR commented Apr 2, 2026

Hi maintainers, gentle follow-up on this PR when you have time.
This is my first contribution to nuclei-templates.
Please let me know if any changes are needed from my side. Thank you!

@CEHCVKR
Copy link
Copy Markdown
Author

CEHCVKR commented Apr 6, 2026

Hi maintainers,
I’ve pushed an update addressing the hardening feedback in commit d0627b6:

  1. clarified authenticated context (PR:L),
  2. added explicit @timeout for both timing-based requests,
  3. kept verified: false intentionally until validation on confirmed vulnerable and patched targets.

I also revalidated locally with:
nuclei -validate -duc -t [CVE-2026-5105.yaml]

Could you please approve the pending workflow and re-review when convenient? Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants