Impact
A flaw in the setUpgradeUboot function of Totolink N300RH firmware 6.1c.1353_B20190305 allows an attacker to manipulate the FileName argument and inject arbitrary operating system commands. This vulnerability falls under command injection, as defined by CWE-77 and CWE-78, and could enable an adversary to execute commands with the privileges of the device process, compromising confidentiality, integrity, and availability of the router and any connected network.
Affected Systems
The Totolink N300RH router is affected. The firmware version 6.1c.1353_B20190305 contains the flaw. No other firmware versions or product families are listed in the data.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate severity, and the EPSS score is not provided. The vulnerability is not listed in CISA's KEV catalog. A proof‑of‑concept exploit is publicly available, and the attack vector is likely remote, inferred from the description that the flaw can be leveraged remotely. These factors increase the risk that the flaw could be exploited in the wild against exposed devices.
OpenCVE Enrichment