CVE-2026-36841

TOTOLINK · N200RE V5

A command injection vulnerability in the TOTOLINK N200RE V5 router allows remote code execution via specifically crafted parameters in the formMapDelDevice function.

Executive summary

A critical command injection vulnerability in the TOTOLINK N200RE V5 allows unauthenticated remote attackers to execute arbitrary system commands.

Vulnerability

The device fails to properly sanitize input for the 'macstr' and 'bandstr' parameters within the 'formMapDelDevice' function, enabling command injection.

Business impact

This vulnerability carries a CVSS score of 9.8, indicating the highest level of risk. An attacker can gain full control over the affected networking hardware, leading to total network compromise, data interception, and the potential to use the device as a pivot point for further internal network attacks.

Remediation

Immediate Action: Apply the latest firmware update provided by TOTOLINK to address the command injection flaw.

Proactive Monitoring: Monitor network traffic for unusual outbound connections or attempts to access administrative functions from unexpected sources.

Compensating Controls: Disable remote management interfaces on the WAN side and restrict access to the device management console to trusted internal IP addresses only.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

This is a critical security risk requiring immediate mitigation. Administrators must ensure the affected firmware is patched immediately to prevent full device compromise by unauthenticated remote actors.