Vulnerability Description
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | Ca300-Poe Firmware | 6.2c.884 |
| Totolink | Ca300-Poe | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.mdExploitThird Party Advisory
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#pocExploitThird Party Advisory
- https://vuldb.com/?ctiid.313838Permissions RequiredVDB Entry
- https://vuldb.com/?id.313838Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.602265Third Party AdvisoryVDB Entry
- https://www.totolink.net/Product
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.mdExploitThird Party Advisory
- https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#pocExploitThird Party Advisory
FAQ
What is CVE-2025-6620?
CVE-2025-6620 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument...
How severe is CVE-2025-6620?
CVE-2025-6620 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-6620?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink Ca300-Poe Firmware, Totolink Ca300-Poe.