CVE-2025-6620

A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*

History

27 Jun 2025, 18:11

Type Values Removed Values Added
References () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md - () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md - Exploit, Third Party Advisory
References () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.313838 - () https://vuldb.com/?ctiid.313838 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.313838 - () https://vuldb.com/?id.313838 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.602265 - () https://vuldb.com/?submit.602265 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
First Time Totolink ca300-poe
Totolink
Totolink ca300-poe Firmware
CPE cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*

26 Jun 2025, 14:15

Type Values Removed Values Added
References () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md - () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md -
References () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc -
Summary
  • (es) Se encontró una vulnerabilidad en TOTOLINK CA300-PoE 6.2c.884. Se ha clasificado como crítica. Este problema afecta a la función setUpgradeUboot del archivo upgrade.so. La manipulación del argumento FileName provoca la inyección de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

25 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 18:15

Updated : 2025-06-27 18:11


NVD link : CVE-2025-6620

Mitre link : CVE-2025-6620

CVE.ORG link : CVE-2025-6620


JSON object : View

Products Affected

totolink

  • ca300-poe_firmware
  • ca300-poe
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')