Metrics
Affected Vendors & Products
Fri, 03 Apr 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.1360_b20241207:*:*:*:*:*:*:* cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.1498_b20250826:*:*:*:*:*:*:* |
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink x6000r
|
|
| Vendors & Products |
Totolink x6000r
|
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection. The attack may be launched remotely. | |
| Title | TOTOLINK X6000R shttpd setLanCfg privilege escalation | |
| First Time appeared |
Totolink
Totolink x6000r Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:totolink:x6000r_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink x6000r Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-03-23T21:13:27.140Z
Updated: 2026-03-25T19:14:18.836Z
Reserved: 2026-03-23T05:43:53.029Z
Link: CVE-2026-4611
Updated: 2026-03-25T19:14:15.410Z
Status : Analyzed
Published: 2026-03-23T22:16:31.463
Modified: 2026-04-03T11:31:14.030
Link: CVE-2026-4611
No data.