Skip to main content

CVE-2025-6621: OS Command Injection in TOTOLINK CA300-PoE

Medium
VulnerabilityCVE-2025-6621cvecve-2025-6621
Published: Wed Jun 25 2025 (06/25/2025, 18:00:16 UTC)
Source: CVE Database V5
Vendor/Project: TOTOLINK
Product: CA300-PoE

Description

A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:42:40 UTC

Technical Analysis

CVE-2025-6621 is a security vulnerability identified in the TOTOLINK CA300-PoE router, specifically in firmware version 6.2c.884. The flaw exists within the QuickSetting function of the ap.so component, where improper handling of the 'hour' and 'minute' arguments allows for OS command injection. This vulnerability enables an attacker to remotely execute arbitrary operating system commands on the affected device without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability arises due to insufficient input validation or sanitization of parameters passed to system-level commands, allowing crafted inputs to be interpreted as executable commands. Although the CVSS 4.0 base score is 5.3 (medium severity), the exploitability is relatively straightforward given the network attack vector and lack of user interaction. The scope is limited to devices running the specified firmware version, and there is no indication of privilege escalation beyond the existing privilege level required (PR:L). No public exploit code has been confirmed in the wild yet, but the disclosure of the vulnerability and technical details increases the risk of exploitation. The vulnerability impacts the confidentiality, integrity, and availability of the device, as arbitrary command execution can lead to data leakage, device manipulation, or denial of service. The absence of patches or vendor mitigation guidance at the time of publication further elevates the risk for organizations using this device in their network infrastructure.

Potential Impact

For European organizations, the exploitation of CVE-2025-6621 could lead to significant operational disruptions and security breaches. The TOTOLINK CA300-PoE is a Power over Ethernet (PoE) router commonly used in small to medium-sized enterprise networks and branch offices for network connectivity and management. Successful exploitation could allow attackers to gain control over network routing, intercept or manipulate traffic, and potentially pivot to other internal systems. This compromises confidentiality through data interception, integrity through unauthorized configuration changes, and availability by causing device outages or network disruptions. Given the remote attack vector and no need for user interaction, attackers could automate exploitation attempts, increasing the likelihood of widespread impact. The vulnerability is particularly concerning for organizations relying on TOTOLINK devices for critical infrastructure or sensitive communications. Additionally, the lack of a patch at the time of disclosure means organizations must rely on interim mitigations, increasing exposure duration. The medium CVSS score may underestimate the real-world impact in environments where these devices are critical network components.

Mitigation Recommendations

1. Immediate network segmentation: Isolate TOTOLINK CA300-PoE devices from critical network segments to limit potential lateral movement if compromised. 2. Access control: Restrict management interfaces to trusted IP addresses and implement strict firewall rules to limit exposure of vulnerable services. 3. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect unusual command injection patterns or suspicious activity targeting the QuickSetting function. 4. Firmware upgrade: Engage with TOTOLINK support to obtain patched firmware or updates addressing this vulnerability as soon as they become available. 5. Disable or restrict QuickSetting functionality if possible, or remove remote management capabilities temporarily until a patch is applied. 6. Conduct regular vulnerability scans and penetration tests focusing on network devices to identify similar injection flaws. 7. Maintain detailed logs and enable alerting on configuration changes or unexpected command executions on affected devices. 8. Educate network administrators about the vulnerability and ensure strict operational procedures to minimize risk during the interim period.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-25T07:14:01.493Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685c3f5ae230f5b23485598f

Added to database: 6/25/2025, 6:26:34 PM

Last enriched: 6/25/2025, 6:42:40 PM

Last updated: 8/17/2025, 5:54:08 PM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats