CVE-2026-32729 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 17, 2026
Runtipi - Authentication Bypass
Overview
Runtipi < 4.8.1 contains a broken authentication caused by lack of rate limiting and account lockout on /api/auth/verify-totp endpoint, letting attackers with valid credentials brute-force 2FA TOTP codes, exploit requires valid user credentials.
Severity & Score
Impact
Attackers with valid credentials can bypass two-factor authentication by brute-forcing TOTP codes, leading to full account compromise.
Mitigation
Upgrade to version 4.8.1 or later.
Social Media Activity(1 post)
š CVE-2026-32729 - High (8.1) Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/auth/verify-totp endpoint does not enforce any rate limiting, attempt counting, or account lockout mechanism. An attacker who has obtained a user's valid credentials (... š https://www.thehackerwire.com/vulnerability/CVE-2026-32729/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32729
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_authentication
- Status
- confirmed
- EPSS
- 6.0%
- Social Posts
- 1
CWE
- CWE-307
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N