Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a7000r
|
|
| Vendors & Products |
Totolink a7000r
|
Mon, 13 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. | |
| Title | TOTOLINK A7000R cstecgi.cgi setWiFiEasyGuestCfg stack-based overflow | |
| First Time appeared |
Totolink
Totolink a7000r Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:totolink:a7000r_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a7000r Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-16T13:26:41.857Z
Reserved: 2026-04-12T20:49:43.517Z
Link: CVE-2026-6168
Updated: 2026-04-16T13:26:34.505Z
Status : Deferred
Published: 2026-04-13T07:16:51.283
Modified: 2026-04-27T19:05:57.310
Link: CVE-2026-6168
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:52:41Z