TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.

Project Subscriptions

Vendors Products
Totolink Subscribe
A3600r Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3600r Firmware
CPEs cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a3600r_firmware:5.9c.4959:*:*:*:*:*:*:*
Vendors & Products Totolink a3600r Firmware

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3600r
Vendors & Products Totolink
Totolink a3600r

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in A3600R Root SSID Configuration Enables Remote Code Execution

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-01T18:23:53.528Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31027

cve-icon Vulnrichment

Updated: 2026-04-01T18:22:52.544Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T16:23:49.787

Modified: 2026-04-07T12:10:47.497

Link: CVE-2026-31027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:59:57Z

Weaknesses