Cyber Posture

CVE-2026-1686

HighPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1686 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Totolink A3600R Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer overflow by requiring validation and bounds checking on the apcliSsid input argument in setAppEasyWizardConfig.

prevent

Requires timely identification, reporting, and remediation of the specific buffer overflow flaw via firmware patching or upgrades.

prevent

Implements memory protections such as stack canaries, ASLR, and DEP to block exploitation of the buffer overflow even if triggered.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Buffer overflow in router's configuration function enables remote arbitrary code execution from low privileges, directly facilitating public-facing application exploitation (T1190) and privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The…

more

exploit has been released to the public and may be used for attacks.

Deeper analysisAI

CVE-2026-1686 is a buffer overflow vulnerability affecting the Totolink A3600R router on firmware version 5.9c.4959. The issue resides in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library, where manipulation of the apcliSsid argument triggers the overflow. Associated with CWE-119 and CWE-120, it was published on 2026-01-30 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Exploitation results in high impacts to confidentiality, integrity, and availability, potentially enabling arbitrary code execution on the device. A proof-of-concept exploit has been publicly released.

Advisories referenced on VulDB and a GitHub repository detail the vulnerability and provide exploit code, but no specific patches or mitigation steps are outlined in the available information.

Details

CWE(s)

Affected Products

totolink
a3600r firmware
5.9c.4959

CVEs Like This One

CVE-2026-31027Same product: Totolink A3600R
CVE-2026-5020Same product: Totolink A3600R
CVE-2026-1158Same vendor: Totolink
CVE-2025-9781Same vendor: Totolink
CVE-2026-4976Same vendor: Totolink
CVE-2025-7912Same vendor: Totolink
CVE-2025-7758Same vendor: Totolink
CVE-2025-9779Same vendor: Totolink
CVE-2026-1157Same vendor: Totolink
CVE-2025-1852Same vendor: Totolink

References