CVE-2026-26736
Received Received - Intake
Stack-Based Buffer Overflow in TOTOLINK A3002RU_V3 IPv6 Setup

Publication date: 2026-02-17

Last updated on: 2026-03-09

Assigner: MITRE

Description
TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-17
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-02-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a3002ru_firmware to 3.0.0-b20220304.1804 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function of TOTOLINK A3002RU_V3 firmware. Detection would involve monitoring or inspecting the use of the static_ipv6 parameter in network device configurations or traffic.

Specific commands or detection methods are not detailed in the provided resources.


What immediate steps should I take to mitigate this vulnerability?

The provided information does not specify immediate mitigation steps for this vulnerability.


Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow found in the TOTOLINK A3002RU_V3 router firmware version 3.0.0-B20220304.1804. It occurs via the static_ipv6 parameter in the formIpv6Setup function. A buffer overflow happens when more data is written to a buffer than it can hold, potentially allowing an attacker to overwrite adjacent memory.


How can this vulnerability impact me? :

A stack-based buffer overflow can allow an attacker to execute arbitrary code, cause a denial of service (crash the device), or gain unauthorized access to the device. This could lead to compromise of the router, interception or manipulation of network traffic, and potentially further attacks on connected devices.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart