CVE-2026-1158
Totolink · Totolink Multiple Products
A security flaw discovered in Totolink LR350 9 hardware could allow attackers to bypass security measures and impact device stability.
Executive summary
Totolink LR350 9 devices are affected by a high-severity security flaw that grants attackers the potential to disrupt network services and compromise sensitive information.
Vulnerability
A security flaw has been identified in the firmware of the Totolink LR350 9. Given the high CVSS score, this vulnerability likely resides in a critical management function or network service, though the exact authentication level required for exploitation has not been publicly disclosed by the vendor.
Business impact
An exploit targeting this flaw could allow an attacker to gain unauthorized control over the router, leading to potential data exfiltration and loss of service. With a CVSS score of 8.8, the severity is High, indicating that the business impact would be severe, potentially resulting in reputational damage and the compromise of all connected client devices.
Remediation
Immediate Action: Update all affected Totolink LR350 9 hardware to the most recent firmware version available from the manufacturer's support portal.
Proactive Monitoring: Implement enhanced logging on the network perimeter and monitor for unusual administrative activity or unexpected reboots of the affected hardware.
Compensating Controls: Utilize a Web Application Firewall (WAF) or network-level Access Control Lists (ACLs) to shield the device management interface from untrusted networks.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant risk to the security posture of any network utilizing the Totolink LR350. We strongly recommend that organizations treat this as a high-priority update. Apply the primary remediation firmware patch immediately to mitigate the risk of unauthorized access and potential network disruption.