Description
A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The firmware revision B20211125.1046 of the Totolink A3002MU contains a stack-based buffer overflow in the HTTP Request Handler function sub_410188, triggered by submitting a manipulated wan‑url argument through the /boafrm/formWlanSetup endpoint. This flaw can be abused by a remote actor to overflow local stack buffers, potentially leading to arbitrary code execution or a denial‑of‑service condition. The vendor notes that remote exploitation is possible and that an exploit has already been made public.

Affected Systems

The affected device is the Totolink A3002MU router running firmware version B20211125.1046. The vulnerability resides in the HTTP Request Handler component accessed via the web administration interface.

Risk and Exploitability

The CVSS v3.1 score of 8.7 indicates a high severity, while the EPSS score is not reported and the vulnerability is not listed in the CISA KEV catalog. Because the flaw can be triggered remotely via standard HTTP requests and successful exploitation is publicly available, the risk is significant for any network that exposes the router’s WAN configuration interface.

Generated by OpenCVE AI on April 13, 2026 at 18:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Totolink’s official website for a firmware update that addresses the stack-based buffer overflow in the formWlanSetup module.
  • If a patch is not immediately available, restrict access to the WAN configuration interface by applying ACLs or disabling remote management.
  • Monitor network traffic for abnormal HTTP requests targeting the /boafrm/formWlanSetup endpoint.

Generated by OpenCVE AI on April 13, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002mu
Vendors & Products Totolink
Totolink a3002mu

Mon, 13 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title Totolink A3002MU HTTP Request formWlanSetup sub_410188 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A3002mu
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T18:56:01.530Z

Reserved: 2026-04-13T08:43:38.208Z

Link: CVE-2026-6194

cve-icon Vulnrichment

Updated: 2026-04-13T18:55:56.739Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T18:16:32.107

Modified: 2026-04-22T20:23:16.350

Link: CVE-2026-6194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:49Z

Weaknesses