CVE-2026-26736
Stack-Based Buffer Overflow in TOTOLINK A3002RU_V3 IPv6 Setup
Publication date: 2026-02-17
Last updated on: 2026-03-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | a3002ru_firmware | to 3.0.0-b20220304.1804 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function of TOTOLINK A3002RU_V3 firmware. Detection would involve monitoring or inspecting the use of the static_ipv6 parameter in network device configurations or traffic.
Specific commands or detection methods are not detailed in the provided resources.
What immediate steps should I take to mitigate this vulnerability?
The provided information does not specify immediate mitigation steps for this vulnerability.
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow found in the TOTOLINK A3002RU_V3 router firmware version 3.0.0-B20220304.1804. It occurs via the static_ipv6 parameter in the formIpv6Setup function. A buffer overflow happens when more data is written to a buffer than it can hold, potentially allowing an attacker to overwrite adjacent memory.
How can this vulnerability impact me? :
A stack-based buffer overflow can allow an attacker to execute arbitrary code, cause a denial of service (crash the device), or gain unauthorized access to the device. This could lead to compromise of the router, interception or manipulation of network traffic, and potentially further attacks on connected devices.