A3000ru Firmware Totolink A3000ru Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink A3000ru Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Totolink A3000ru Firmware. Last year, in 2025 A3000ru Firmware had 2 security vulnerabilities published. Right now, A3000ru Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 2 4.80
2024 1 8.80

It may take a day or so for new A3000ru Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink A3000ru Firmware Security Vulnerabilities

Improper Access Control in TOTOLINK A3000RU ExportIbmsConfig.sh v<5.9c.5185
CVE-2025-2955 5.3 - Medium - March 30, 2025

A vulnerability has been found in TOTOLINK A3000RU up to 5.9c.5185 and classified as problematic. This vulnerability affects unknown code of the file /cgi-bin/ExportIbmsConfig.sh of the component IBMS Configuration File Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Authorization

Improper Access Control in Syslog Export (TOTOLINK A3000RU <=5.9c.5185)
CVE-2025-2688 4.3 - Medium - March 24, 2025

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

Authorization

TOTOLINK A3000RU 5.9c.5185 Hardcoded Pass via product.ini
CVE-2024-7170 8.8 - High - July 28, 2024

A vulnerability was found in TOTOLINK A3000RU 5.9c.5185. It has been rated as problematic. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272591. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Use of Hard-coded Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink A3000ru Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe