Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a3600r Firmware
|
|
| CPEs | cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3600r_firmware:5.9c.4959:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink a3600r Firmware
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a3600r |
|
| Vendors & Products |
Totolink
Totolink a3600r |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service. | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-01T18:23:53.528Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31027
Updated: 2026-04-01T18:22:52.544Z
Status : Analyzed
Published: 2026-04-01T16:23:49.787
Modified: 2026-04-07T12:10:47.497
Link: CVE-2026-31027
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:59:57Z