Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack-based Buffer Overflow via VPN Parameters in TOTOLINK A3002RU Router |
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
ssvc
|
Fri, 20 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a3002ru-v2
Totolink a3002ru Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:totolink:a3002ru-v2:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20211108.1455:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink a3002ru-v2
Totolink a3002ru Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 18 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a3002ru |
|
| Vendors & Products |
Totolink
Totolink a3002ru |
Tue, 17 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-11T15:19:31.620Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26732
Updated: 2026-03-06T18:35:57.537Z
Status : Modified
Published: 2026-02-17T19:21:57.493
Modified: 2026-03-11T16:16:39.540
Link: CVE-2026-26732
No data.
OpenCVE Enrichment
Updated: 2026-04-16T07:00:10Z