A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Fri, 27 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink ca300-poe
Totolink ca300-poe Firmware
CPEs cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink ca300-poe
Totolink ca300-poe Firmware

Wed, 25 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Jun 2025 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title TOTOLINK CA300-PoE wps.so SetWLanApcliSettings os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-25T17:31:07.361Z

Updated: 2025-06-25T17:53:30.513Z

Reserved: 2025-06-25T07:13:53.533Z

Link: CVE-2025-6618

cve-icon Vulnrichment

Updated: 2025-06-25T17:53:20.937Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-25T18:15:24.757

Modified: 2025-06-27T18:20:53.133

Link: CVE-2025-6618

cve-icon Redhat

No data.