Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26736: n/a

0
High
VulnerabilityCVE-2026-26736cvecve-2026-26736
Published: Tue Feb 17 2026 (02/17/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 20:03:32 UTC

Technical Analysis

CVE-2026-26736 is a stack-based buffer overflow vulnerability identified in the TOTOLINK A3002RU_V3 router firmware version 3.0.0-B20220304.1804. The vulnerability arises from improper handling of the static_ipv6 parameter within the formIpv6Setup function, where input data can overflow a stack buffer. This flaw allows an unauthenticated remote attacker to send specially crafted requests to the device, triggering the overflow and enabling arbitrary code execution. The vulnerability does not require user interaction or prior authentication, increasing its exploitability. The CVSS v3.1 base score of 8.8 reflects its high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the nature of the vulnerability suggests that exploitation could lead to complete device takeover, allowing attackers to manipulate network traffic, intercept sensitive data, or disrupt network services. The vulnerability is categorized under CWE-121, indicating a classic stack-based buffer overflow issue, which is a common and well-understood security flaw. The absence of available patches or firmware updates at this time necessitates immediate defensive measures by affected organizations.

Potential Impact

The impact of CVE-2026-26736 is severe for organizations relying on TOTOLINK A3002RU_V3 routers. Successful exploitation can lead to remote code execution, enabling attackers to gain full control over the affected device. This compromises the confidentiality of network traffic, integrity of routing and firewall rules, and availability of network services. Attackers could use compromised routers as footholds for lateral movement within internal networks, launch man-in-the-middle attacks, or disrupt critical communications. Given the router’s role in both home and small to medium enterprise environments, the vulnerability poses risks to personal data, business operations, and potentially critical infrastructure if these devices are deployed in such contexts. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks once exploit code becomes available. The vulnerability could also be leveraged in botnet campaigns or as part of broader cyber espionage or sabotage efforts.

Mitigation Recommendations

1. Immediately segment networks to isolate vulnerable TOTOLINK A3002RU_V3 devices from sensitive systems and critical infrastructure. 2. Disable IPv6 functionality on affected devices if it is not required, as the vulnerability is triggered via the static_ipv6 parameter. 3. Implement strict firewall rules to restrict access to the router’s management interfaces, especially from untrusted or external networks. 4. Monitor network traffic for unusual patterns or attempts to exploit the static_ipv6 parameter, including malformed IPv6 configuration requests. 5. Regularly check for firmware updates or security advisories from TOTOLINK and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with a stronger security track record if patching is delayed. 7. Employ network intrusion detection/prevention systems (IDS/IPS) capable of detecting buffer overflow exploit attempts targeting router management interfaces. 8. Educate network administrators about this vulnerability and the importance of minimizing exposure of management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699575bd80d747be205377f9

Added to database: 2/18/2026, 8:18:05 AM

Last enriched: 3/14/2026, 8:03:32 PM

Last updated: 4/7/2026, 2:19:12 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses