Описание
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-6621
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md#poc
- https://vuldb.com/?ctiid.313839
- https://vuldb.com/?id.313839
- https://vuldb.com/?submit.602266
- https://www.totolink.net
Связанные уязвимости
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Уязвимость функции QuickSetting() (ap.so) микропрограммного обеспечения маршрутизаторов TOTOLINK CA300-PoE, позволяющая нарушителю выполнить произвольные команды