Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826.
Published: 2026-01-30
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OS Command Injection flaw that allows attackers to execute arbitrary system commands without authentication. Because victim systems accept unsanitized input, an attacker can compromise confidentiality, integrity, and availability of the device. The flaw is classified as CWE‑78."

Affected Systems

TOTOLINK X6000R routers running firmware versions up to V9.4.0cu.1498_B20250826 are affected; newer firmware revisions beyond that release are not known to be vulnerable.

Risk and Exploitability

With a CVSS score of 9.2 the vulnerability is considered critical. The EPSS score of less than 1% indicates a low probability of exploitation in the current landscape, but the flaw is not listed in CISA’s KEV catalog. Exploitation requires no credentials and can be carried out over the network from any remote host that can reach the exposed management interface, giving attackers full control over the device and potentially the underlying network.

Generated by OpenCVE AI on April 18, 2026 at 01:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by TOTOLINK that addresses the command injection flaw.
  • Configure the router to restrict remote management to trusted IP ranges or disable remote management altogether.
  • Secure the network by isolating the router with firewall rules to prevent unauthorized traffic from reaching the vulnerable interfaces.

Generated by OpenCVE AI on April 18, 2026 at 01:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink x6000r
Vendors & Products Totolink
Totolink x6000r

Fri, 30 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826.
Title TOTOLINK X6000R Unauthenticated Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2026-02-26T15:04:41.771Z

Reserved: 2026-01-30T20:48:17.433Z

Link: CVE-2026-1723

cve-icon Vulnrichment

Updated: 2026-01-30T21:20:50.401Z

cve-icon NVD

Status : Deferred

Published: 2026-01-30T21:15:57.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:15:05Z

Weaknesses