Skip to main content

CVE-2025-6620: OS Command Injection in TOTOLINK CA300-PoE

Medium
VulnerabilityCVE-2025-6620cvecve-2025-6620
Published: Wed Jun 25 2025 (06/25/2025, 18:00:14 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: CA300-PoE

Description

A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:42:55 UTC

Technical Analysis

CVE-2025-6620 is a security vulnerability identified in the TOTOLINK CA300-PoE router, specifically in version 6.2c.884. The flaw exists in the setUpgradeUboot function within the upgrade.so component. This vulnerability arises due to improper handling of the FileName argument, which can be manipulated to perform OS command injection. An attacker can remotely exploit this vulnerability without requiring user interaction or prior authentication, as indicated by the CVSS vector. The vulnerability allows an attacker to execute arbitrary operating system commands on the affected device, potentially leading to unauthorized control over the router. Although the CVSS score is rated medium (5.3), the vulnerability's nature—remote command injection—poses significant risks. The exploit has been publicly disclosed, increasing the likelihood of exploitation, although no confirmed exploits in the wild have been reported yet. The vulnerability impacts the confidentiality, integrity, and availability of the device, as an attacker could execute commands to disrupt network traffic, intercept data, or pivot to other internal systems. The scope is limited to devices running the specific vulnerable firmware version 6.2c.884 of the TOTOLINK CA300-PoE router. Since no patch links are currently available, mitigation relies on alternative protective measures until an official fix is released.

Potential Impact

For European organizations, the exploitation of this vulnerability could have serious consequences, especially for those relying on TOTOLINK CA300-PoE devices within their network infrastructure. Successful exploitation could allow attackers to gain control over network routing devices, leading to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate networks. This is particularly critical for sectors with high dependency on network availability and data confidentiality, such as finance, healthcare, and critical infrastructure. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these devices are exposed to untrusted networks. Additionally, the public disclosure of the exploit code may accelerate attack attempts, increasing the urgency for mitigation. The medium CVSS score reflects some limitations in exploitability or impact scope, but the real-world risk remains significant due to the device's role in network operations.

Mitigation Recommendations

Immediately isolate TOTOLINK CA300-PoE devices running firmware version 6.2c.884 from untrusted networks to reduce exposure to remote attacks. Implement network segmentation to limit access to management interfaces of affected devices, restricting them to trusted administrative networks only. Deploy strict firewall rules to block unauthorized inbound traffic targeting the device's management ports. Monitor network traffic for unusual command execution patterns or unexpected firmware upgrade attempts that could indicate exploitation attempts. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts targeting this vulnerability. Contact TOTOLINK support or monitor official channels for firmware updates or patches addressing this vulnerability and plan for prompt deployment once available. Consider replacing vulnerable devices with alternative hardware from vendors with a strong security track record if immediate patching is not feasible. Ensure all network device credentials are strong and changed from default to prevent further compromise in case of partial exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-25T07:13:58.616Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685c3f5ae230f5b234855987

Added to database: 6/25/2025, 6:26:34 PM

Last enriched: 6/25/2025, 6:42:55 PM

Last updated: 8/19/2025, 12:51:07 PM

Views: 43

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats