Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a7000r
|
|
| Vendors & Products |
Totolink a7000r
|
Mon, 13 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. | |
| Title | TOTOLINK A7000R cstecgi.cgi setWiFiEasyGuestCfg stack-based overflow | |
| First Time appeared |
Totolink
Totolink a7000r Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:totolink:a7000r_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a7000r Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-13T06:30:14.050Z
Reserved: 2026-04-12T20:49:43.517Z
Link: CVE-2026-6168
No data.
Status : Awaiting Analysis
Published: 2026-04-13T07:16:51.283
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-6168
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:52:41Z