Totolink Vulnerabilities
Comprehensive security vulnerability database for Totolink products
6
1
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-70328 | 8.8 | This vulnerability allows an authenticated attacker to run any shell command on the device by exploiting a flaw in how the system handles time synchronization input. Although the first part of the input is checked, the rest can be manipulated, giving attackers the ability to execute harmful commands if they have access to the system. | totolinkx6000r firmware | Theoretical | about 1 month agoFeb 23, 2026 |
| CVE-2025-70327 | 9.8 | This vulnerability allows an attacker with access to the device to inject harmful commands into the system's ping utility, which can lead to the device becoming unresponsive or overloaded. The attacker can exploit this by sending specially crafted input that the device does not properly check, making it a serious risk for devices running the affected firmware. | totolinkx5000r firmware | Theoretical | about 1 month agoFeb 23, 2026 |
| CVE-2025-70329 | 8.0 | This vulnerability allows an authenticated attacker to run any command on the device with full root access by manipulating certain settings in the firmware. The attacker needs to be logged in to the device to exploit this flaw, making it critical for users to secure their access. | totolinkx5000r firmware | Theoretical | about 1 month agoFeb 23, 2026 |
| CVE-2026-26736 | 8.8 | This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router, potentially taking full control of the device. It occurs when the router processes a specially crafted input related to IPv6 settings, meaning an attacker needs to have access to the router's configuration interface to exploit it. | totolinka3002ru firmware | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2026-26732 | 8.8 | This vulnerability allows an attacker to execute malicious code on the TOTOLINK A3002RU router by sending specially crafted input through the vpnUser or vpnPassword fields. To exploit this, the attacker needs access to the router's web interface, which typically requires being on the same network. | totolinka3002ru firmware | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2026-26731 | 8.8 | This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router by sending specially crafted data through the router name parameter. It requires the attacker to have access to the router's web interface, which could be exploited if the router is exposed to the internet or if an attacker is on the same local network. | totolinka3002ru firmware | Exploit Available | about 2 months agoFeb 17, 2026 |
About Totolink Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Totolink products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.