Medium severity6.3NVD Advisory· Published Jun 25, 2025· Updated Apr 29, 2026
CVE-2025-6621
CVE-2025-6621
Description
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Affected products
1- cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.mdnvdExploitThird Party Advisory
- github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
- www.totolink.netnvdProduct
News mentions
0No linked articles in our index yet.