Description
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2025-06-25
Score: 5.3 Medium
EPSS: 2.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19128 A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Fri, 27 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink ca300-poe
Totolink ca300-poe Firmware
CPEs cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink ca300-poe
Totolink ca300-poe Firmware

Wed, 25 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Jun 2025 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK CA300-PoE wps.so SetWLanApcliSettings os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink Ca300-poe Ca300-poe Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-06-25T17:53:30.513Z

Reserved: 2025-06-25T07:13:53.533Z

Link: CVE-2025-6618

cve-icon Vulnrichment

Updated: 2025-06-25T17:53:20.937Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-25T18:15:24.757

Modified: 2025-06-27T18:20:53.133

Link: CVE-2025-6618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses