Totolink A800R Routers Hit by Remote Buffer Overflow
The National Vulnerability Database (NVD) has flagged a critical vulnerability, CVE-2026-6157, affecting Totolink A800R routers running firmware version 4.1.2cu.5137_B20200730. This isn’t just a theoretical flaw; according to NVD, an exploit is now public, meaning the clock is ticking for anyone still on vulnerable hardware. This remote buffer overflow, specifically in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library, is ripe for abuse.
The manipulation of the apcliSsid argument is the entry point for this buffer overflow. With a CVSS score of 8.8 (High), this isn’t some low-impact bug. A successful exploit could lead to full compromise, giving an attacker significant control over the affected device. It’s a classic case of CWE-119 and CWE-120, highlighting the persistent danger of improper buffer handling in embedded systems.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6157
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6157 | Buffer Overflow | Totolink A800R version 4.1.2cu.5137_B20200730 |
| CVE-2026-6157 | Buffer Overflow | Vulnerable function: setAppEasyWizardConfig in /lib/cste_modules/app.so |
| CVE-2026-6157 | Buffer Overflow | Vulnerable argument: apcliSsid |