Description
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the routernamer`parameter in the formDnsv6 function.
Published: 2026-02-17
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow caused by insufficient bounds checking of the routernamer parameter in the formDnsv6 function of TOTOLINK A3002RU firmware. This flaw allows an attacker to corrupt stack memory, potentially enabling arbitrary code execution or denial of service. It corresponds to CWE-121 and CWE-787 weaknesses.

Affected Systems

The flaw impacts TOTOLINK A3002RU routers running firmware version 2.1.1-B20211108.1455. No other versions or product lines are known to be affected by this specific issue.

Risk and Exploitability

The CVSS score of 8.0 indicates a high severity impact. With an EPSS score of less than 1 %, the likelihood of real-world exploitation is low, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Nevertheless, the remote nature of the formDnsv6 interface suggests that an attacker with network access to the router could trigger the overflow, potentially leading to full compromise of the device.

Generated by OpenCVE AI on April 16, 2026 at 06:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest firmware revision that resolves the buffer overflow in the formDnsv6 function.
  • If a patch is not yet available, block or disable remote web administration access that exposes the formDnsv6 endpoint, or restrict the router to a trusted local network only.
  • Segregate the router from critical internal systems through network segmentation and monitor for anomalous traffic or attempts to exploit the vulnerable endpoint.

Generated by OpenCVE AI on April 16, 2026 at 06:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Title Stack-based Buffer Overflow in TOTOLINK A3002RU Router Firmware via Routernamer Parameter

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 20 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3002ru-v2
Totolink a3002ru Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:totolink:a3002ru-v2:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20211108.1455:*:*:*:*:*:*:*
Vendors & Products Totolink a3002ru-v2
Totolink a3002ru Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002ru
Vendors & Products Totolink
Totolink a3002ru

Tue, 17 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the routernamer`parameter in the formDnsv6 function.
References

Subscriptions

Totolink A3002ru A3002ru-v2 A3002ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-16T15:13:25.829Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26731

cve-icon Vulnrichment

Updated: 2026-03-03T18:12:20.194Z

cve-icon NVD

Status : Modified

Published: 2026-02-17T19:21:57.383

Modified: 2026-03-16T16:16:13.577

Link: CVE-2026-26731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:00:10Z

Weaknesses