Description
TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
Published: 2026-04-01
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the setAppEasyWizardConfig API of the Totolink A3600R router’s firmware (5.9c.4959). The rootSsid parameter is not length‑checked, allowing an attacker to send a string that exceeds the buffer boundary, corrupting memory on the device’s stack and potentially executing arbitrary code or crashing the service. This weakness is classified as CWE‑120, a classic buffer overflow that can compromise confidentiality, integrity, and availability of the router.

Affected Systems

The flaw affects Totolink A3600R devices running firmware version 5.9c.4959. No other firmware versions are known to contain the unpatched vulnerability. All other builds may have been fixed, but verification is required before assuming immunity.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity level. The EPSS score of less than 1% suggests a low probability of exploitation, yet the vulnerability is remotely reachable over the network via the setAppEasyWizardConfig interface. Because remote attackers can trigger the buffer overflow without local access, the risk remains high until the device is updated or mitigated.

Generated by OpenCVE AI on April 7, 2026 at 20:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that patches the rootSsid validation flaw on the Totolink A3600R.
  • If an update is not immediately available, restrict or block traffic to the setAppEasyWizardConfig endpoint by configuring firewall rules or disabling the feature through the router’s settings.
  • Monitor the router for abnormal configuration requests or repeated attempts to set the rootSsid, and verify that firmware integrity checks are enforced whenever possible.

Generated by OpenCVE AI on April 7, 2026 at 20:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3600r Firmware
CPEs cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3600r_firmware:5.9c.4959:*:*:*:*:*:*:*
Vendors & Products Totolink a3600r Firmware

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3600r
Vendors & Products Totolink
Totolink a3600r

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Totolink A3600r A3600r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-01T18:23:53.528Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31027

cve-icon Vulnrichment

Updated: 2026-04-01T18:22:52.544Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T16:23:49.787

Modified: 2026-04-07T12:10:47.497

Link: CVE-2026-31027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:59:57Z

Weaknesses