Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
TOTOLINK A3002RU Router Allows Unauthorized Access
CVE-2026-26732
Summary
A security issue in the TOTOLINK A3002RU router can be exploited remotely, potentially allowing an attacker to gain unauthorized access to the device. This could lead to malicious activity or the execution of arbitrary commands. Users should update to the latest firmware version to ensure security.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| totolink | a3002ru_firmware | 2.1.1-b20211108.1455 | – |
Original title
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.
Original description
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.
nvd CVSS3.1
8.8
Vulnerability type
CWE-787
Out-of-bounds Write
CWE-121
Stack-based Buffer Overflow
- https://github.com/0xmania/cve/tree/main/TOTOLINK-A3002RU-boa-formFilter-StackOv... Exploit Third Party Advisory
Published: 17 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026