Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19183 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Jun 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink ca300-poe Totolink ca300-poe Firmware |
|
| CPEs | cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink ca300-poe Totolink ca300-poe Firmware |
Thu, 26 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | TOTOLINK CA300-PoE upgrade.so setUpgradeUboot os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-26T13:33:58.901Z
Reserved: 2025-06-25T07:13:58.616Z
Link: CVE-2025-6620
Updated: 2025-06-26T13:33:52.463Z
Status : Analyzed
Published: 2025-06-25T18:15:25.137
Modified: 2025-06-27T18:11:26.180
Link: CVE-2025-6620
No data.
OpenCVE Enrichment
No data.
EUVD