Description
A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection. The attack may be launched remotely.
Published: 2026-03-23
Score: 8.6 High
EPSS: 1.3% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The setLanCfg function within the shttpd daemon on certain TOTOLINK X6000R routers allows a craft host‑name argument to trigger operating‑system command injection. By exploiting this flaw an attacker can run arbitrary commands with the privileges of the shttpd process, effectively gaining privileged control over the device. The vulnerability is related to Command Injection weaknesses (CWE‑77) and Shell Command Injection (CWE‑78).

Affected Systems

Devices running the TOTOLINK X6000R firmware versions 9.4.0cu.1360_B20241207 or 9.4.0cu.1498_B20250826 are vulnerable. The affected product is the X6000R router model, accessible via its web management interface.

Risk and Exploitability

The flaw can be triggered remotely through the exposed HTTP service; no prior authentication or local access is required beyond network connectivity to the router. Its rating indicates high severity, but current exploit prevalence is expected to be low. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, yet an attacker who succeeds could fully compromise the device, allowing unauthorized configuration changes, data exfiltration, and persistence within the network.

Generated by OpenCVE AI on April 3, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the X6000R router if a version newer than 9.4.0cu.1498_B20250826 is available.
  • If a firmware update cannot be applied immediately, disable the shttpd service or block all external traffic to the router’s HTTP management interface with firewall rules.
  • Restrict management access to the router so that only trusted hosts or subnets can reach the web interface.
  • Monitor router logs for unexpected Hostname changes or shell command execution events and alert on suspicious activity.

Generated by OpenCVE AI on April 3, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.1360_b20241207:*:*:*:*:*:*:*
cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.1498_b20250826:*:*:*:*:*:*:*

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink x6000r
Vendors & Products Totolink x6000r

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection. The attack may be launched remotely.
Title TOTOLINK X6000R shttpd setLanCfg privilege escalation
First Time appeared Totolink
Totolink x6000r Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:x6000r_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink x6000r Firmware
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Totolink X6000r X6000r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T19:14:18.836Z

Reserved: 2026-03-23T05:43:53.029Z

Link: CVE-2026-4611

cve-icon Vulnrichment

Updated: 2026-03-25T19:14:15.410Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T22:16:31.463

Modified: 2026-04-03T11:31:14.030

Link: CVE-2026-4611

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:18:07Z

Weaknesses