Description
A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-04-13
Score: 6.9 Medium
EPSS: 2.4% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the setUpgradeUboot function of Totolink N300RH firmware 6.1c.1353_B20190305 allows an attacker to manipulate the FileName argument and inject arbitrary operating system commands. This vulnerability falls under command injection, as defined by CWE-77 and CWE-78, and could enable an adversary to execute commands with the privileges of the device process, compromising confidentiality, integrity, and availability of the router and any connected network.

Affected Systems

The Totolink N300RH router is affected. The firmware version 6.1c.1353_B20190305 contains the flaw. No other firmware versions or product families are listed in the data.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate severity, and the EPSS score is not provided. The vulnerability is not listed in CISA's KEV catalog. A proof‑of‑concept exploit is publicly available, and the attack vector is likely remote, inferred from the description that the flaw can be leveraged remotely. These factors increase the risk that the flaw could be exploited in the wild against exposed devices.

Generated by OpenCVE AI on April 13, 2026 at 06:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Totolink website or vendor support portal for a firmware update that addresses the setUpgradeUboot command injection flaw.
  • If a firmware update is available, apply it promptly to the N300RH router.
  • If no patch is released, restrict remote access to the router’s management interfaces, or block traffic to the upgrade.so endpoint using firewall or ACLs.
  • Disable or remove the remote firmware upgrade feature if it is not required.
  • Monitor the device for unauthorized or anomalous command execution and verify that the vulnerability has been mitigated.

Generated by OpenCVE AI on April 13, 2026 at 06:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink n300rh
Vendors & Products Totolink n300rh

Mon, 13 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title Totolink N300RH upgrade.so setUpgradeUboot os command injection
First Time appeared Totolink
Totolink n300rh Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink n300rh Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink N300rh N300rh Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T04:00:19.297Z

Reserved: 2026-04-12T18:06:33.592Z

Link: CVE-2026-6158

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T05:16:05.003

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-6158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:22Z

Weaknesses