CVE-2026-26732

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute malicious code on the TOTOLINK A3002RU router by sending specially crafted input through the vpnUser or vpnPassword fields. To exploit this, the attacker needs access to the router's web interface, which typically requires being on the same network.

Technical Description

TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 17, 2026

about 2 months ago

Last Modified

Feb 20, 2026

about 2 months ago

Vendor

totolink

Product

a3002ru firmware

Related Vulnerabilities

CVE-2025-70328High

This vulnerability allows an authenticated attacker to run any shell command on the device by exploiting a flaw in how the system handles time synchronization input. Although the first part of the input is checked, the rest can be manipulated, giving attackers the ability to execute harmful commands if they have access to the system.

CVE-2025-70327Critical

This vulnerability allows an attacker with access to the device to inject harmful commands into the system's ping utility, which can lead to the device becoming unresponsive or overloaded. The attacker can exploit this by sending specially crafted input that the device does not properly check, making it a serious risk for devices running the affected firmware.

CVE-2025-70329High

This vulnerability allows an authenticated attacker to run any command on the device with full root access by manipulating certain settings in the firmware. The attacker needs to be logged in to the device to exploit this flaw, making it critical for users to secure their access.

CVE-2026-26736High

This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router, potentially taking full control of the device. It occurs when the router processes a specially crafted input related to IPv6 settings, meaning an attacker needs to have access to the router's configuration interface to exploit it.

CVE-2026-26731High

This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router by sending specially crafted data through the router name parameter. It requires the attacker to have access to the router's web interface, which could be exploited if the router is exposed to the internet or if an attacker is on the same local network.