Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink n300rt |
|
| Vendors & Products |
Totolink
Totolink n300rt |
Wed, 03 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TOTOLINK N300RT wireless router firmware versions prior to V3.4.0-B20250430 (discovered in V2.1.8-B20201030.1539) contain an OS command injection vulnerability in the Boa formWsc handling functionality. An unauthenticated attacker can send specially crafted requests to trigger command execution via the targetAPSsid request parameter. | |
| Title | TOTOLINK N300RT <= V2.1.8-B20201030.1539 Boa formWsc RCE | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-03T21:27:04.052Z
Reserved: 2025-04-15T19:15:22.585Z
Link: CVE-2025-34319
Updated: 2025-12-03T21:26:59.744Z
Status : Awaiting Analysis
Published: 2025-12-03T17:15:51.840
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-34319
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:44:21Z