A3600R Firmware
by Totolink
Standard maintenance is sufficient
A3600R Firmware has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 25 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2022-25078 | 9.8 | 5.7% | — |
| CVE-2024-7171 | 6.3 | 2.7% | — |
| CVE-2024-7181 | 6.3 | 2.5% | — |
| CVE-2024-7175 | 6.3 | 2.5% | — |
| CVE-2026-5020 | 6.3 | 1.6% | — |
| CVE-2022-36455 | 7.8 | 1.3% | — |
| CVE-2026-31027 | 9.8 | 0.8% | — |
| CVE-2022-34993 | 9.8 | 0.4% | — |
| CVE-2024-7185 | 8.8 | 0.4% | — |
| CVE-2024-7174 | 8.8 | 0.3% | — |
| CVE-2024-7187 | 8.8 | 0.3% | — |
| CVE-2024-7176 | 8.8 | 0.3% | — |
| CVE-2024-7183 | 8.8 | 0.3% | — |
| CVE-2024-7179 | 8.8 | 0.3% | — |
| CVE-2024-7177 | 8.8 | 0.3% | — |
| CVE-2022-29377 | 7.5 | 0.3% | — |
| CVE-2024-7172 | 8.8 | 0.3% | — |
| CVE-2024-7173 | 8.8 | 0.3% | — |
| CVE-2024-7178 | 8.8 | 0.3% | — |
| CVE-2024-7180 | 8.8 | 0.3% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.