Medium severity6.3NVD Advisory· Published Jun 25, 2025· Updated Apr 29, 2026
CVE-2025-6620
CVE-2025-6620
Description
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Affected products
1- cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.mdnvdExploitThird Party Advisory
- github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
- www.totolink.netnvdProduct
News mentions
0No linked articles in our index yet.