A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
https://vuldb.com/?submit.602265
https://vuldb.com/?ctiid.313838
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
Published: 2025-06-25
Updated: 2025-06-26
Base Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
Severity: Medium
Base Score: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 2.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Low
EPSS: 0.02539