ID

VAR-202506-1303


CVE

CVE-2025-6619


TITLE

TOTOLINK  of  CA300-PoE  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007635

DESCRIPTION

A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. Affected by this vulnerability is the function setUpgradeFW of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of CA300-PoE The firmware contains a command injection vulnerability. OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK CA300-PoE is a wireless access point from China's TOTOLINK Electronics. The TOTOLINK CA300-PoE upgrade.so file has a command injection vulnerability, which is caused by the parameter FileName of the file upgrade.so failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution

Trust: 2.16

sources: NVD: CVE-2025-6619 // JVNDB: JVNDB-2025-007635 // CNVD: CNVD-2025-14227

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-14227

AFFECTED PRODUCTS

vendor:totolinkmodel:ca300-poescope:eqversion:6.2c.884

Trust: 1.0

vendor:totolinkmodel:ca300-poescope: - version: -

Trust: 0.8

vendor:totolinkmodel:ca300-poescope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ca300-poescope:eqversion:ca300-poe firmware 6.2c.884

Trust: 0.8

vendor:totolinkmodel:ca300-poe 6.2c.884scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-14227 // JVNDB: JVNDB-2025-007635 // NVD: CVE-2025-6619

CVSS

SEVERITY

CVSSV2

CVSSV3

[email protected]: CVE-2025-6619
value: LOW

Trust: 1.0

[email protected]: CVE-2025-6619
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-007635
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-14227
value: MEDIUM

Trust: 0.6

[email protected]: CVE-2025-6619
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-007635
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-14227
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

[email protected]: CVE-2025-6619
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

[email protected]: CVE-2025-6619
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-007635
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-14227 // JVNDB: JVNDB-2025-007635 // NVD: CVE-2025-6619 // NVD: CVE-2025-6619

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007635 // NVD: CVE-2025-6619

EXTERNAL IDS

db:NVDid:CVE-2025-6619

Trust: 3.2

db:VULDBid:313837

Trust: 1.8

db:JVNDBid:JVNDB-2025-007635

Trust: 0.8

db:CNVDid:CNVD-2025-14227

Trust: 0.6

sources: CNVD: CNVD-2025-14227 // JVNDB: JVNDB-2025-007635 // NVD: CVE-2025-6619

REFERENCES

url:https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md

Trust: 2.4

url:https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc

Trust: 1.8

url:https://vuldb.com/?id.313837

Trust: 1.8

url:https://vuldb.com/?submit.602264

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.313837

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-6619

Trust: 0.8

sources: CNVD: CNVD-2025-14227 // JVNDB: JVNDB-2025-007635 // NVD: CVE-2025-6619

SOURCES

db:CNVDid:CNVD-2025-14227
db:JVNDBid:JVNDB-2025-007635
db:NVDid:CVE-2025-6619

LAST UPDATE DATE

2025-07-04T23:34:21.644000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-14227date:2025-06-27T00:00:00
db:JVNDBid:JVNDB-2025-007635date:2025-07-01T07:33:00
db:NVDid:CVE-2025-6619date:2025-06-27T18:19:19.447

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-14227date:2025-06-27T00:00:00
db:JVNDBid:JVNDB-2025-007635date:2025-07-01T00:00:00
db:NVDid:CVE-2025-6619date:2025-06-25T18:15:24.950
OSZAR »